Hi [[ session.user.profile.firstName ]]

2020 Cost of Insider Threats Global Report

Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

● What kinds of Insider Threats cost organizations the most
● How investigations are driving up the cost-per-incident for companies
● Which organizations, industries, and regions are being targeted the most
● How companies can potentially save millions by using a dedicated Insider Threat management approach

*This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Recorded Feb 20 2020 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT
Presentation preview: 2020 Cost of Insider Threats Global Report

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Mar 26 2020 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Beyond the Phish: A Snapshot of End-User Behavior Mar 26 2020 10:00 am UTC 38 mins
    Paul Down, Senior Director, Proofpoint EMEA
    You're invited to our most exciting webinar of the year - Beyond the Phish: A snapshot of end-user behaviour!

    During this webinar, we will address key findings from our Beyond the Phish Report that explores end-user knowledge across topics such as cyber hygiene, security, and compliance. The report analyses millions of responses gathered from our Security Education Platform.

    Join us live to learn:
    • The importance of assessing and training end-users on cybersecurity threats beyond email-based social engineering
    • Common strengths and weaknesses among end-users across 14 cybersecurity topics
    • How to gain a holistic view of susceptibility by looking beyond knowledge assessments and training activities

    ---------------------------------------------

    BONUS! All attendees will receive a free download of Beyond the Phish, Proofpoint's most wide-ranging report on user knowledge of cyber-hygiene, security and compliance.

    ---------------------------------------------

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Live Demo: A People-Centric Approach to Insider Threat Management Mar 24 2020 5:00 pm UTC 45 mins
    Kevin Donovan, Sr. Solutions Architect
    Accordingly to McKinsey more than 50% of all data breaches are the result of insider threats. As more companies look to successfully transition to the cloud, traditional ways of protecting data and intellectual property aren’t enough. Context is key when incidents occur to understand intent from the user-perspective and enable a streamlined investigative process. So how is this achieved?

    Join this live demo as we discuss:

    · Methodologies that reduce investigation times by 60-90%
    · The value behind correlating user activity + data movement in insider related incidents
    · Communication techniques to measure risk when involving other business stakeholders
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access Mar 24 2020 10:00 am UTC 41 mins
    Chen Nisnkorn, Sr. Director of Technical Sales & Micha Rave, Sr Director Product Management
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Protecting Your People and Data - Featuring Forrester's Zero Trust Framework Mar 19 2020 10:00 am UTC 60 mins
    Ryan Kalember, EVP of Cybersecurity Strategy - Proofpoint & Chase Cunningham, Principal Analyst
    There's lots of noise in the cybersecurity industry around zero-trust, but Forrester Research pioneered the original and most effective framework. It’s never been more important to understand how zero-trust principles apply to your environment, with people becoming the new perimeter, and protecting them and the data they access becoming the new imperative.

    In our upcoming webinar, we will take a closer look at the original Zero Trust Approach as defined by Forrester Research and applied in practice by leading security teams. The webinar will cover:

    - An overview of the Zero Trust approach
    - Concrete first steps for getting started
    - Guidelines on how to evaluate your standing within the maturity model
    - How Zero Trust reinforces people-centric security

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • 3 Strategies for Staying Compliant Beyond Email Mar 18 2020 5:00 pm UTC 60 mins
    Dan Nadir, VP & GM of Product Management and Amanda Cannata, Product Marketing Manager for Digital Risk and Compliance
    Today’s business value is created with increasingly distributed teams. Organizations are able to scale more successfully by enabling employees with faster, more effective ways to communicate. Slack, Microsoft Teams, and Zoom are just a few of the many engines that contribute to this acceleration. We have seen first-hand how collaboration technologies have become essential to business strategy.

    In this webinar, we will explore how you can build a winning business in this new digital landscape — beyond email and risk-free.

    We'll cover:

    -The compliance risks posed by increasingly distributed electronic communications

    -The challenges associated with capturing and supervising electronic communications

    -Steps you can take to ensure complete capture across all channels
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access Mar 12 2020 5:00 pm UTC 45 mins
    Michael Kaunitz, Sr. Sales Field Specialist with Proofpoint
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • 2020 Cost of Insider Threats Global Report Mar 12 2020 10:00 am UTC 46 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    ● What kinds of Insider Threats cost organizations the most
    ● How investigations are driving up the cost-per-incident for companies
    ● Which organizations, industries, and regions are being targeted the most
    ● How companies can potentially save millions by using a dedicated Insider Threat management approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo - Countering Business Email Compromise (BEC) with Email Fraud Defense Mar 11 2020 5:00 pm UTC 45 mins
    Tanner Luxner, Product Marketing Manager of Proofpoint
    With staggering losses of $1.7 billion in 2019, business email compromise (BEC) is a crucial attack issue organizations to protect against. As these threats don't typically include malware or detectable malicious intent, protecting against them is not an easy task. One very essential component of full protection against BEC is email authentication. How can you use this to better protect your people and your organization?

    Join Proofpoint as we dive into BEC and how Email Authentication can help defend against it. In this session, we'll share:

    - The many components of BEC
    - A framework for understanding where potential gaps exist
    - A live demo of how Email Authentication can help provide protection for these gaps.
  • Break Through Tunnel Vision: Security Awareness is Not Just About Phishing Mar 10 2020 5:00 pm UTC 60 mins
    Mike Bailey, Sr. Product Marketing Manager
    According to the 2019 Verizon DBIR, 94% of breaches are from attacks targeting your people. We can make your people resilient against these threats by helping you conduct a targeted, data-driven security awareness program.

    Join us as we take a deeper dive into end-user risk beyond phishing.

    We’ll explore:
    •Common risk areas that could lead to your next breach
    •How end users are performing from around the globe
    •What you can do to assess and reduce these common risk areas.

    At the end of the webinar we’ll provide you the opportunity to take our free People Risk Assessment and see how you compare with other companies in your industry.
  • A People-Centric Approach to Managing Insider Threats: Introducing ObserveIT Mar 10 2020 10:00 am UTC 42 mins
    Mayank Choudhary, SVP of ObserveIT | Proofpoint
    Insider Threats are quickly becoming one of the greatest cyber security threats that organizations face today. They are responsible for three million records are stolen every day and at the heart of 57% of all database breaches last year (Verizon 2019). Research also shows that the average time to spot and contain an insider threat is a massive 77 days -- just 13% of incidents are caught within 30 days (Ponemon 2020).

    The reason they are so prolific and take so long to deal with is because anyone with legitimate, trusted access to an organization’s systems and data – whether full-time employee, part-time contractor or strategic business partner – can be an Insider Threat.

    Managing insider threats fundamentally requires a people-centric approach. With the acquisition of ObserveIT, Proofpoint adds a powerful Insider Threat Management platform to our portfolio of People Centric cybersecurity solutions. The ObserveIT platform delivers unique capability to monitor both user and file activity, enabling security and compliance professionals can be alerted to risky, out-of-policy activities and any unexplained changes in user behavior in real-time; successfully stopping and investigating any activity before it becomes a full-blown breach.

    Join ObserveIT | Proofpoint SVP Mayank Choudhary, in this webinar to:

    · Learn how the key components of full visibility – user activity, data activity, and behavior analytics – provide the necessary context to understanding Insider Threats

    · Discover how an organization’s risk of an Insider Threat can be reduced through always-on monitoring, without compromising user privacy and compliance; with real-life case studies to illustrate

    · See a demo explaining of how out-of-policy user activity is detected and investigated on-the-spot

    · Learn about the different types of Insider Threats and find out what steps you can take to build your own Insider Threat Management program
  • People-Centric Threats on Digital Channels and How to Stop Them Mar 5 2020 6:00 pm UTC 60 mins
    Amanda Cannata, Product Marketing Manager for Digital Risk and Compliance
    Threat actors don’t just target your people via email. They also use digital channels, like the web and social media, to launch attacks targeting your employees, partners and customers. And these socially engineered schemes on digital channels can leave your business just as exposed as those that come through email.

    Join this webinar to learn about the biggest digital threats to your people, and how you can take steps to block them. You’ll learn:

    · How attackers register fake web domains to phish customers, conduct targeted email attacks, and more

    · How malicious content on social media can put your customers and executives at risk

    · How the deep web and darknet provide tools and opportunities for threat actors to launch digital attacks
  • Cyber Resilience in the age of Targeted Attacks Mar 5 2020 9:00 am UTC 49 mins
    Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint
    As a CISO, you already know that the bad actors are shifting their targets from technology to people. Instead of attacking your infrastructure, they’re now more focused on people, their roles within an organisation, the data to which they have access, and their likelihood to “click here.” Your role not only comprises of building an excellent cybersecurity strategy but also consider resources, technology stack, training end users, managing expectations of the board and the big C – compliance. In midst of all this, you also need to think about what happens after an attack? With all these targeted threats lurking in your users’ inboxes, how can you make your business more cyber resilient?

    Join Loic Guezo, a celebrated expert in cybersecurity and Senior Director at Proofpoint as he shares his expertise on some of the pain points faced by CISOs and how to overcome them. He’ll cover:

    - Latest trends from the threat landscape and what they mean for businesses
    - How to strike a balance between security, compliance, technology and processes while keeping people in the centre of it all
    - Considerations for building cybersecurity and resiliency strategies

    -------------------------------------------------------------------

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks.

    Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Zero Trust Network Access: The People-Centric Alternative to VPN Mar 4 2020 5:00 pm UTC 60 mins
    Gabriel Meekins, Sr. Sales Acct Mgr & William Guilherme, Sr. Sales Engineer
    The network perimeter is dissolving, and applications are migrating to the cloud. The number of users working remotely has grown exponentially over the last decade and to keep up, enterprises need people-centric solutions to protect users and data both on and off-premise.

    Join us for our upcoming webinar where we will take a look at how Zero Trust Network Access (ZTNA) replaces traditional remote access VPNs, which did a great job 20 years ago, but no longer meet the secure remote access needs of today’s enterprise. In today’s work environment, people are becoming the new perimeter, and protecting them and the data they access is the new imperative.

    In this webinar, you will learn how ZTNA solutions:

    ● Microsegment network access and reduce the attack surface
    ● Simplify management across all data centers and clouds
    ● Deliver superior end-user experience around the world
    ● Drive cloud-scale efficiency and agility
  • Live Demo: Proofpoint CASB Adaptive Access Controls Mar 3 2020 6:00 pm UTC 45 mins
    Bo Mendenhall, Cloud Security Solutions Architect from Proofpoint
    Proofpoint Cloud App Security Broker(CASB) is a people-centric cloud security platform that helps defend your data in the cloud with adaptive access controls. Proofpoint keeps improving our CASB and expanding our integrations with leading cloud service providers to help you gain visibility to cloud security and compliance risks, automate response faster, and simplify deployment and operations.

    Join us to see how Proofpoint cloud security helps you monitor for and control risky user access and data handling. Through a live demonstration, you'll see first-hand how our innovative approach sees cloud threats and risks other security solutions miss.

    - TAP SaaS Defense monitoring for cloud risks
    - Third-party apps risks and governance
    - ServiceNow login and event monitoring, including DLP
    - Adaptive access controls including risk-based access
  • Formation de sensibilisation à la sécurité – Votre meilleure ligne de défense Mar 3 2020 1:00 pm UTC 60 mins
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe Mar 3 2020 9:00 am UTC 60 mins
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

    Deutsch
  • Ensuring that Your Users are the Solid Line of Defense Against Cyber Threats Recorded: Feb 27 2020 60 mins
    Mark Guntrip, Group Product Marketing Director of Proofpoint & Michael Osterman, President of Osterman Research Inc.
    Today’s most popular security tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities. But cybercriminals are no longer targeting infrastructure - they are targeting humans. It's the distracted user who clicks on an email attachment, or the eager customer who fills in credentials in a pixel-perfect phishing page who is vulnerable. It's becoming more and more evident that employees and regulated users need to be at the center of your strategy when building a robust cybersecurity approach in the era of highly sophisticated attacks. So how is that achieved?

    Join Proofpoint for a joint presentation with Osterman Research as we deep dive into some of the biggest challenges CISOs face, and why developing a people-centric strategy to security is the most effective way to protect your most valuable assets: your data and your people.

    In this session, we'll share:

    - Latest research findings on new methods for solving security attacks such as phishing and business email compromise
    - Why cybersecurity transformation is critical for protecting your people against today's threat actors
    - What it means and looks like to have an effective people-centric approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • eCommunications Monitoring: Doing More with Less Recorded: Feb 27 2020 46 mins
    John Pepe, JD Regulatory Counsel
    Join us for a short, TED-style talk on what low-tech approaches firms are employing to keep up with the ever growing demands of eCommunications review. Highlights include:

    - Using Risk Assessments to drastically reduce review queues
    - Framing risk scenarios and objectives to balance regulatory obligations against limited resources
    - Rethinking your monitoring program to keep up with the pace of change
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2020 Cost of Insider Threats Global Report
  • Live at: Feb 20 2020 6:00 pm
  • Presented by: Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT
  • From:
Your email has been sent.
or close