Hi [[ session.user.profile.firstName ]]

Beyond the Phish: A Snapshot of End-User Behavior

You're invited to our most exciting webinar of the year - Beyond the Phish: A snapshot of end-user behaviour!

During this webinar, we will address key findings from our Beyond the Phish Report that explores end-user knowledge across topics such as cyber hygiene, security, and compliance. The report analyses millions of responses gathered from our Security Education Platform.

Join us live to learn:
• The importance of assessing and training end-users on cybersecurity threats beyond email-based social engineering
• Common strengths and weaknesses among end-users across 14 cybersecurity topics
• How to gain a holistic view of susceptibility by looking beyond knowledge assessments and training activities

---------------------------------------------

BONUS! All attendees will receive a free download of Beyond the Phish, Proofpoint's most wide-ranging report on user knowledge of cyber-hygiene, security and compliance.

---------------------------------------------

About Proofpoint

Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
Recorded Mar 26 2020 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Paul Down, Senior Director, Proofpoint EMEA
Presentation preview: Beyond the Phish:  A Snapshot of End-User Behavior

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Panel: Detect and Block Business Email Scams with Proofpoint Oct 15 2020 1:30 pm UTC 30 mins
    Matt Cooke, Davide Canali, Neil Hammet & Chris Clarke of Proofpoint EMEA
    Business Email Compromise (BEC) often starts with an email in which attackers pose as someone the victim trusts. In the message, there’s a seemingly legitimate business request that usually involves a wire transfer or financial payment. None of these emails carries malicious payload making it difficult to detect this new form of email threat.

    But things are changing. Technology can now surpass people and process initiatives to proactively eliminate fraudulent emails, removing the guesswork for users.

    Join this expert panel discussion to learn more about:
    · How BEC attacks happen
    · Why defenders must think beyond the phish into a multi-layered approach
    · How Proofpoint provides actionable visibility and threat insights
    · How Proofpoint identifies and blocks common BEC attack tactics

    This is the third of three webinars forming a mini-summit:
    Session 1: Evolving Business Email Attack Tactics from Lockdown through to Return to Work
    Session 2: Customer Case Study - Protecting the UK's HM Revenue & Customs (HMRC) from Email Fraud
    Session 3: Live Panel - Detect and Block BEC Scams

    Links to all three sessions in the attachments.
  • Customer Story: Defending UK’s HM Revenue & Customs (HMRC) Against Email Fraud Oct 13 2020 1:30 pm UTC 30 mins
    Neil Hammet, Senior Product Evangelist, Email Fraud Defence & Chris Clarke, Email Fraud Defence
    Business Email Compromise (BEC) and Email Account Compromise (EAC) scams have cost the victimised businesses over $26 billion since 2016. Gartner even predicts that these new forms of email threats will continue to double each year to over $5 billion through 2023. Unfortunately, there’s no silver bullet for BEC and EAC. These human-activated threats require an end-to-end solution that addresses all attack tactics.
     
    Join us to hear how Proofpoint helped HMRC, the UK Government department for Revenue and Customs who manage among other things UK Corporation tax, UK Income tax and VAT.
     
    - HMRC’s experiences with the changing landscapes of BEC and EAC
    - The specific challenge they faced
    - How Proofpoint found a solution to help them tackle this problem
    - How success was tracked and measured

    This is the second of three webinars forming a mini-summit:
    Session 1: Evolving Business Email Attack Tactics from Lockdown through to Return to Work
    Session 2: Customer Case Study - Protecting the UK's HM Revenue & Customs (HMRC) from Email Fraud
    Session 3: Live Panel - Detect and Block BEC Scams

    Links to all three sessions in the attachments.
  • Evolving Business Email Attack Tactics from Lockdown to Return to Work Oct 8 2020 1:30 pm UTC 60 mins
    Matt Cooke, CyberSecurity Specialist & Davide Canali, Senior Threat Researcher, Proofpoint EMEA
    COVID-19 not only impacts our lives but also affects cyber threat landscape, which continues to be dominated by coronavirus-related activities. Proofpoint Threat Research team has observed more and more business email compromise (BEC) and email account compromise (EAC) scams leveraging coronavirus lures. In addition, attackers have come up with more sophisticated tactics to trick their targets into making fraudulent wire transfer.

    Join our Proofpoint experts to learn more about:

    - The current state of COVID-themed BEC/EAC scams
    - New BEC tactics targeting organisation’s supply chain
    - The differences between BEC and other tactics, such as malware and cred-phish
    - Why threat actors choose a certain attack tactic and the psychology behind criminal minds

    This is the first of three webinars forming a mini-summit:
    Session 1: Evolving Business Email Attack Tactics from Lockdown through to Return to Work
    Session 2: Customer Case Study - Protecting the UK's HM Revenue & Customs (HMRC) from Email Fraud
    Session 3: Live Panel - Detect and Block BEC Scams

    Links to all three sessions in the attachments.
  • Securing SaaS and IaaS with CASB Recorded: Sep 18 2020 99 mins
    Panel of cybersecurity experts
    The move to the cloud and a remote workforce has brought new security and compliance risks. Cloud account takeover, excessive sharing of data, usage of unapproved cloud applications and misconfiguration of IaaS resources present big challenges to security teams. Securing IT-approved applications, such as Microsoft Office 365, Google G Suite, Box, Dropbox, Salesforce, Slack, AWS, Azure, ServiceNow and more, is a priority now more than ever.

    Join us for a discussion on how a people-centric security approach with CASB can help you and your company to:

    - Identify the users accessing cloud applications, detect and protect against cloud account takeover
    - Prevent data loss and ensure compliance with relevant regulations
    - Gain visibility into cloud usage, including cloud-to-cloud usage such as third-party OAuth apps
    - Discover IaaS accounts and resources and manage your cloud security posture
    - Define and enforce policies on cloud access and the handling of data in the cloud
  • Driving Real Behavior Change with Security Awareness Training Recorded: Sep 18 2020 60 mins
    Panel of cybersecurity experts
    With October's Cybersecurity Awareness Month approaching fast, it’s important to get security awareness and training top-of-mind with your users. Given that 80% of organizations only allocate two hours or less per year for security awareness, how can you maximize your time with users to ensure behavior change?

    In this webinar, we’ll go over proven ways to plan and execute a successful program such as:

    · Focusing your program on the riskiest users
    · Keeping users engaged and on-your-side
    · Benchmarking against top-performing organizations
    · Reporting up to key stakeholders
  • Back to School for Students & Back to Basics for InfoSec Recorded: Sep 17 2020 57 mins
    Mike Manrod, CISO of Grand Canyon Education & Ryan Witt, Managing Director at Proofpoint
    New semesters bring new cybersecurity threats. As new students and staff receive their new college emails, the more opportunities there are for attackers to strike. Even today, most cyberattacks still start with phishing emails because their tactics continue to evolve and work. So how can you better protect your institution?

    Join our guest speaker Mike Manrod, CISO at Grand Canyon Education, and Ryan Witt, Managing Director at Proofpoint, for this webinar as they focus on higher education’s evolving threat landscape and the increasingly sophisticated tactics cybercriminal are using to target academia. In this session, we will examine how to you can:

    - Harden your email security to stop phishing, ransomware, and BEC attacks
    - Stop email spoofing and spot look-alike domains
    - Protect sensitive data with an integrated DLP platform
  • Four Best Practices to reduce Insider Risk in the new [work] reality Recorded: Sep 17 2020 57 mins
    Rob Bolton, Sr Director from Proofpoint Insider Threat Management
    Did you know 99% of all threats are human-activated, and 96% of all data breaches start with people? [ Source: Gartner.]

    Despite this reality, most organisations rely on traditional cybersecurity tools that focus more on data and systems than on people. Whether the intent is negligent, malicious or criminal, it’s time to protect your business against data loss and brand damage. The best, most modern security solutions are designed to be people-centric.

    Join Rob Bolton, Senior Director and and Julian Mauss, Technical Expert at Proofpoint Insider Threat Management, to learn about the four best practices to manage insider threats. Learn why it’s critical to blend people, process and technology to detect, investigate and respond to insider risk in today’s new [work] reality.

    In this talk, you will learn:

    • How distributed workforces and third-party workers access systems and data
    • The unique risks of insider threats
    • How to protect against data loss
    • Why a people-centric approach is key to mitigating insider risk
  • Live Demo: Ramping Up People-Centric Security Business Email/Account Compromise Recorded: Sep 16 2020 43 mins
    Joel Sierra, Sr. Sales Engineer at Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint has revamped our three-phase cybersecurity maturity model to help you elevate your advanced email security, stop business email & account compromise, and protect your cloud applications.

    Join us for a live demo to learn how you can continue your people-centric security journey and see the tools in action. In this second phase of three phases, we’ll demonstrate how to:

    - Protect your people from impostor email attacks, like business email compromise (BEC)
    - Investigate and respond to the risks of email account compromise (EAC), including internal email threats sent from compromised accounts
    - Prevent risks associated with personal webmail and risky websites sent via corporate email
  • How to Combat Email Fraud - Stop Business Email & Account Compromise Recorded: Sep 15 2020 43 mins
    Sara Pan, Sr. Product Marketing Manager of Proofpoint
    Nearly 90% of organizations experienced business email compromise (BEC) and email account compromise (EAC) attacks in 2019. According to our researchers, there’s a 45% jump in these email scams overall. The average attack nets the attacker approximately $130,000. A traditional Secure Email Gateway (SEG) that only relies on malware detection, static rules matching, and sandboxing technologies, fails to protect against these new forms of email threats that prey on human nature. So how can you better protect your users and company?

    Join us for this session to learn more about:

    - The common tactics used in a BEC/EAC attack
    - A framework that helps you identify potential gaps
    - The techniques for addressing email spoofing and credential phishing
    - How automation and visibility play a critical role in resolving incidents
  • Best Practices to Simplify Your Legacy Data Migration Recorded: Sep 15 2020 32 mins
    Thalli Badrinath, Sr. Director and Mark DiGiovanni, Sr. Manager of Professional Services at Proofpoint
    As the scope of data migration projects increases from Terabytes to Petabytes, data imports include more than just messages. When you couple this consideration with customer expectations for speed and compliance needs, it’s imperative supporting professional services evolve with greater agility and innovation.

    Proofpoint indeed has evolved its Compliance and Archiving professional services, from migration to intelligent supervision to e-discovery analytics, to best meet the expectations of organizations migrating to its leading, cloud-native archive. Attend this webinar to learn:

    - What a typical data migration project entails, from extraction to import
    - What legacy migration options should be considered
    - What attributes are characteristic of a modern migration program
  • Inside The 10 Biggest and Boldest Insider Threats of 2019-2020 (Europe Edition) Recorded: Sep 9 2020 50 mins
    Rob Bolton and Lee Duff Insider Threat Management specialists, Proofpoint
    Insider threats come in all shapes and sizes and affect organisations across all industries and geographies. Understanding the motives behind them is key to defence. One of the best ways to do this is to study some of the bold, headline-generating insider threats that have taken place recently, like the big Twitter debacle of July 2020. This is just one example of what has become a very common problem.

    Join us for a live talk with Rob Bolton and Lee Duff, Proofpoint’s Insider Threat Management Senior experts as we reveal the stories behind the biggest and boldest top 10 insider threats of 2019 and 2020 to date.

    You will learn:

    ● What happened in each incident?
    ● Practical security tips inspired by these real-world breaches
    ● How to mitigate your own insider risk
  • Capturing and Managing Communications Data in the Modern Enterprise Recorded: Sep 8 2020 49 mins
    Amanda Anderson, Product Marketing Manager - Proofpoint
    Today’s employees and customers generate a lot of communications data, in a lot of formats and in a lot of locations, from computers and on prem servers to mobile devices and the cloud. And present circumstances—with huge swaths of the population working remotely and stuck inside their homes—have only made digital communications more critical. Employees are using chat and collaboration apps to communicate and keep projects moving forward. And they are using chat, text messaging, social media and more to keep in touch with clients.

    While chat and collaboration apps, text messaging, and social media have made it possible for employees to continue doing business, they can also put the firm at risk. During this time of upheaval, regulatory requirements have not gone away. As they adopt new communication tools, firms must ensure that they continue to comply with regulations and corporate policies. It all starts with capturing and managing your content.

    In this webinar, we will take a deep dive into the challenges that firms face with capturing and managing content as digital communications sprawl. And we’ll also cover strategies for adapting and staying compliant.

    Join us to learn:
    - How the business communications landscape is evolving
    - How to identify your communications data
    - Key considerations for capturing and managing your content
    - How to set yourself up for efficient supervising and eDiscovery
  • The 2020 State of CASB in Europe Recorded: Sep 3 2020 57 mins
    James Johnson, CASB Expert & Jen Gough, Competitive Specialist, Proofpoint EMEA
    With the shift to work from home, cloud security is a bigger concern than ever. As the network perimeter is replaced by a user-defined security perimeter, enterprises need a people-focused approach to threat detection and data protection in the cloud. Organisations have adopted or plan to adopt Cloud Access Security Brokers (CASBs) to help them.
    Join Proofpoint experts as they discuss the findings of a newly conducted research among security professionals to determine the needs of enterprises from CASBs, and whether or not their expectations are being met.
    In this session, they will explore:
    - Where is CASB on the adoption curve?
    - How security professionals use CASB for visibility, compliance, data security, threat protection and access control
    - Effectiveness and next evolution of CASBs
  • Live Demo: Foundations of People-Centric Cybersecurity for Email Recorded: Sep 2 2020 48 mins
    Dustin Anderson, Senior Sales Engineer, Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint has revamped our three-phase cybersecurity maturity model to help you elevate your advanced email security, stop business email & account compromise, and protect your cloud applications.

    Join us for a live demo to learn how you can begin your people-centric security journey and see the tools in action. In this first phase of three phases, we’ll demonstrate how to:

    - Protect your people from the no. 1 threat vector that attackers use today: email
    - Gain visibility into which people are being attacked, how they’re being attacked, and whether they’re compromised
    - Build a robust security awareness training program
  • 10 Biggest and Boldest Insider Threats of 2019-2020 (So Far) Recorded: Sep 2 2020 49 mins
    Josh Epstein, VP of Marketing for ITM & Sai Chavali, Sr. Product Marketing Manager for ITM at Proofpoint
    Insider threats come in all shapes and sizes and affect organizations across all industries and geographies. Understanding the motives behind them is key to defense. One of the best ways to do this is to study some of the bold, headline-generating insider threats that have taken place recently, like the big Twitter debacle of July 2020. This is just one example of what has become a very common problem.

    Join us for a live talk with Josh Epstein, VP Marketing and Sai Chavali, Sr Product Manager at Proofpoint Insider Threat Management as we reveal the stories behind the biggest and boldest top 10 insider threats of 2019 and 2020 to date.

    You will learn:

    - What happened in each incident?
    - Practical security tips inspired by these real-world breaches
    - How to mitigate your own insider risk
  • Live Demo: Security Awareness Training for Healthcare Recorded: Sep 1 2020 46 mins
    Ryan Witt, Managing Director for Healthcare & Matt Nesser, Account Executive for Proofpoint
    The 2020 Verizon Data Breach Investigation Report (DBIR) concluded that email is the initial point of compromise for cyber-attacks 96% of the time. For healthcare, cybercriminals have used email to launch phishing attacks particularly using COVID and PPE lures, or malware infections that could lead to continuity of care problems through attacks like ransomware. As healthcare workers are clearly being targeted, how do you best protect your people and educate them about how to spot and fend off the continuous stream of cyber-attacks? Join this live demo to see Proofpoint Security Awareness Training in action, and how it safeguards against advance threats and compliance risks.

    Register and you’ll learn:

    - The most common attacks in today's healthcare threat landscape
    - A people-centric approach to helping you protect patient data
    - Healthcare specific awareness materials to reinforce your security training initiatives
  • 製品デモ:内部脅威対策 Proofpoint | ObserveIT Insider Threat Management Recorded: Sep 1 2020 31 mins
    Yukimi Sohta; Tsuyoshi Sato ; Seiya Tanaka | Proofpoint
    製品デモンストレーション
    プライバシーを守りながら、ユーザ―の行動を可視化する内部脅威対策
    Proofpoint | ObserveIT Insider Threat Management

    情報漏えいの原因は、内部からの情報漏えいが約半分を占めており、その被害額は過去3年で倍増しています。
    IPAでも2020年の10大脅威で内部不正は2位にとりあげられており、特に日本では内部犯行による被害が他の国よりも多いというデータもでています。
    Withコロナで在宅勤務も広がる中、遠隔から仕事をする従業員「個人の信頼性の確認」が重要視されています。
    人々が分散環境で働く中、従来の境界防御だけでは組織を守れなくなりました。むしろゼロトラストベースで、内側からの脅威にも対応しなければなりません。
    本ウェビナーでは、すでに1,200社以上のお客様にご利用いただいているObserveITをご紹介します。ObserveITで、どのようにユーザーの行動からリスクを特定し、リアルタイムに抑止をかけ、データの漏えいを防ぐことができるかをご覧いただけます。

    http://go.proofpoint.com/subscribe.html ですべてのマーケティング通信をオプトアウトすることができます。
    詳細については、https://www.proofpoint.com/us/privacy-policy のプライバシーポリシーをご覧ください。
  • Private E-Mails im Unternehmen? Ja, aber sicher! Mit adaptiver Web Isolierung. Recorded: Aug 27 2020 64 mins
    Markus Pauly, Cybersecurity Specialist
    Die größte Bedrohung für Ihre Daten sind keine Fehler, die im veralteten Code Ihres Servers verborgen sind, keine Zero-Day-Exploits, die im Dark Web weitergegeben werden, und auch keine alten Laptops, die noch mit Windows 7 laufen. Ihre größte Bedrohung sitzt wahrscheinlich im Büro neben Ihnen, begrüßt Besucher an der Rezeption oder vielleicht sind es sogar Sie selbst. Cyberkriminelle haben erkannt, dass gerade private Webmails, die am Unternehmenslaptop gelesen und beantwortet werden eine Schwachstelle darstellen, für die viele IT-Sicherheitsteams noch keine wirklich effektive Lösung haben.

    In unserem Webinar möchte Ihnen Markus Pauly von Proofpoint eine Isolierungstechnologie vorstellen, die DSGVO konform ist und Sicherheitsprobleme im Zusammenhang mit privaten E-Mail- und Webaktivitäten löst.

    Behandelt werden:
    - Bedrohungsvektor E-Mail – wenn Cyberkriminelle per Social Engineering die Schwachstelle private E-Mail Nutzung im Unternehmen ins Visier nehmen
    - Die Fallstricke bisheriger Lösungsansätze
    - Der beste Ansatz: Adaptive (Web)-Isolierung – inklusive kurzer Demo
  • Email Security: Protect Your No. 1 Threat Vector Recorded: Aug 27 2020 51 mins
    Adrian Covich, Senior Director, Systems Engineering Proofpoint
    According to Gartner, “Business Email Compromise attacks increased by nearly 100% in 2019 and resulted in substantial financial losses in some cases.” Is your business prepared to defend against them?

    Join Adrian Covich of Proofpoint to discover how to keep pace within this rapidly moving threat landscape and best practice ways to protect your people and data from email attacks, the number one threat vector.

    In this session, you will learn:
    - The latest threat data and trends for email cyber attacks
    - How best to defend your people and data with Proofpoint Targeted Attack Protection
    - How to streamline your incident response process for emails

    Join us as we go deep and show you how to better protect against email, the number one threat vector for your business
  • Live Demo: Social Media Compliance Recorded: Aug 25 2020 48 mins
    Shane Sauer, Sales Engineer at Proofpoint
    In financial services, health care, and other highly regulated industries, specific rules govern marketing communications and advertising practices when communicating with the public. So how can you better manage the process and stay compliant? Learn how to solve for complex social compliance pain points with ease using Proofpoint’s solution.

    Join this demo and listen to product expert Shane Sauer, who will demonstrate how Proofpoint:

    - Finds accounts associated with your firm, including rogue adviser accounts
    - Automates reviews and approvals of social profiles
    - Supervises social media activity in real time and notifies you of compliance violations
    - Removes non-compliant social media content
    - Provides detailed reporting and proof of compliance
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Beyond the Phish: A Snapshot of End-User Behavior
  • Live at: Mar 26 2020 10:00 am
  • Presented by: Paul Down, Senior Director, Proofpoint EMEA
  • From:
Your email has been sent.
or close