Hi [[ session.user.profile.firstName ]]

Beyond the Phish: A Snapshot of End-User Behavior

You're invited to our most exciting webinar of the year - Beyond the Phish: A snapshot of end-user behaviour!

During this webinar, we will address key findings from our Beyond the Phish Report that explores end-user knowledge across topics such as cyber hygiene, security, and compliance. The report analyses millions of responses gathered from our Security Education Platform.

Join us live to learn:
• The importance of assessing and training end-users on cybersecurity threats beyond email-based social engineering
• Common strengths and weaknesses among end-users across 14 cybersecurity topics
• How to gain a holistic view of susceptibility by looking beyond knowledge assessments and training activities

---------------------------------------------

BONUS! All attendees will receive a free download of Beyond the Phish, Proofpoint's most wide-ranging report on user knowledge of cyber-hygiene, security and compliance.

---------------------------------------------

About Proofpoint

Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
Recorded Mar 26 2020 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Paul Down, Senior Director, Proofpoint EMEA
Presentation preview: Beyond the Phish:  A Snapshot of End-User Behavior

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Strategies for Better SOC Efficiency Recorded: Apr 9 2020 59 mins
    Vivek Indrayan, Product Manager & Joseph Yun, Security Automation & Orchestration Principal Analyst
    Security teams face many challenges responding to threats targeting your people. Most deal with an overwhelming number of alerts and a struggle to reduce the significant time it takes to respond to and remediate threats. Join this webinar and live demo to see how Proofpoint helps organizations respond faster and more efficiently by delivering full security orchestration, automation and response.

    In this webinar, you will see:

    - How you can enhance your SOC efficiency

    - How to respond faster to incidents

    - How to better protect the number one threat vector (email) and beyond
  • How to securely enable remote working Recorded: Apr 9 2020 52 mins
    Edward Rowley SE manager of EMEA, Proofpoint; Mark Edge Cloud Security Specialist EMEA, Proofpoint
    The Threat Landscape has changed drastically recently as employees around the world are mandated to work from home. Working safely and securely has never been more important.

    How do you enable this enormous challenge while maintaining compliance and reducing business exposure?

    Get practical tips on:
    • Providing employees with secure remote access to applications
    • Securely transitioning a remote workforce
    • Keeping malicious code away from corporate devices.
  • ISSA Thought Leadership Series: Proofpoint State of the Phish 2020 Recorded: Apr 8 2020 62 mins
    ISSA International
    Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention? The sixth annual State of the Phish again delivers critical, actionable insights into the current state of the phishing threat, including:

    The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses.
    The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
    How organizations are delivering phishing awareness training, and the ways they measure program success

    3,500+ technology user insights: Results of a third-party survey of more than 3,500 working adults across seven countries—the United States, Australia, France, Germany, Japan, Spain and the United Kingdom—provide a global perspective on the cybersecurity awareness levels of the average end-user.

    A survey of more than 600 IT security professionals: Proofpoint surveyed IT security professionals from the same seven countries. They shared insights about what they’re experiencing within their organizations, how they are responding to attacks and the steps they’re taking to improve security postures.

    Nearly 50 million simulated phishing emails: Proofpoint compiled and analyzed data from nearly 50 million simulated phishing emails sent to end-users over a one-year period via its cloud-based Security Education Platform.

    More than 9 million reported emails: Proofpoint logged more than 9 million emails reported by their customers’ end users over a 12-month span.


    Moderator:
    Robert Martin, Sr. Security Engineer, Cisco Systems, Inc.

    Speakers:
    Gretel Egan, Security Awareness Training Strategist, Proofpoint
    Paige Yeater, Director of Information Security Program Management, Mainstay Technologies
    Steve Sanders, Vice President, Internal Audit, CSI
  • Protecting People: The New Perimeter Recorded: Apr 8 2020 45 mins
    Ryan Kalember, EVP Cybersecurity Strategy
    The combination of a threat landscape that continues to target users and their credentials and the inexorable shift to cloud has fundamentally changed how security teams should invest their time and their budgets. Join Proofpoint to hear how to leverage people-centric security and the Okta Identity Cloud to gain visibility, mitigate risk, and secure the cloud, turning people from your weakest links into your best protected assets.
  • Phishing During Pandemic: Actors, Campaigns & Threats Leveraging COVID-19 Lures Recorded: Apr 8 2020 48 mins
    Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint
    Targeted attacks start with email, and these security threats are always evolving. Just in the past few weeks alone, the Email lures leveraging the currently challenging times as a unique theme now represents the greatest collection of attack types that the Proofpoint Threat Research and Detection team has seen in years, if not ever.

    We’ve observed credential phishing, malicious attachments, malicious links, business email compromise (BEC), fake landing pages, downloaders, spam, and malware, among others, all leveraging coronavirus lures to exploit your employees, during these heightened emotional times.

    Join our speakers Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy as they take a deep dive into these tactics and share:

    - The current state and rapid evolution of COVID-themed phishing campaigns
    - Key defence mechanisms to reduce your organization’s risk
    - Awareness and training measures you can take to keep your users from falling victim

    Please note: This webinar won’t have a live Q&A as this is a replay; you can still send us your questions and we will get in touch via email after the session.
  • Phishing During Pandemic: Actors, Campaigns & Threats Leveraging COVID-19 - APAC Recorded: Apr 8 2020 48 mins
    Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint
    Coronavirus-related email lures now represent the greatest collection of attack types united by a single theme that the Proofpoint Threat Research and Detection team has seen in years, if not ever. We’ve observed credential phishing, malicious attachments, malicious links, business email compromise (BEC), fake landing pages, downloaders, spam, and malware, among others, all leveraging coronavirus lures.

    Join our speakers Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy as they share:

    - The current state and rapid evolution of COVID-themed phishing campaigns
    - Key defense mechanisms to reduce your organization’s risk
    - Awareness and training measures you can take to keep your users from falling victim

    This session is available for CPE credit with ISC(2). To watch more CPE-eligible sessions, please visit https://go.proofpoint.com/cpe-on-demand-webinars.html?utm_source=webinars.
  • Prevent Phishing Attacks with Proofpoint's Security Awareness Training Recorded: Apr 7 2020 23 mins
    Andrew Brown, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats

    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense

    - Enable your employees to report suspicious messages with a single mouse click
  • 2020 Cost of Insider Threats Global Report Recorded: Apr 7 2020 46 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    ● What kinds of Insider Threats cost organizations the most
    ● How investigations are driving up the cost-per-incident for companies
    ● Which organizations, industries, and regions are being targeted the most
    ● How companies can potentially save millions by using a dedicated Insider Threat management approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Forging an Effective Insider Threat Management Program Recorded: Apr 2 2020 62 mins
    Sai Chavali, Senior Prod Mktrg Mgr, ObserveIT; Nick Cavalancia, Fndr & Chief Techvangelist; Michael Weisberg
    Playing defense against the myriad of outside threats that an organization needs to worry about can take all the attention of a cybersecurity team. But it’s critical that they don’t lose sight of the threat that insiders – employees, contractors, partners and business associates can bring to bear. Often time, these parties need legitimate access to systems within the enterprise, but that access can carry significant risk. Taking a proactive approach to detecting risky user behaviour, protecting against data exfiltration and accelerating the investigation time of insider-led data breaches is critical. The development of an Insider threat management program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Is the risk worth the investment? Join Proofpoint and (ISC)2 on April 2,2020 at 1:00PM Eastern for a discussion on how to build an effective insider threat program.
  • State of the Phish 2020 Recorded: Apr 2 2020 32 mins
    Paul Down, Director, Proofpoint EMEA
    Do you have a good sense of how well your users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks?

    Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including:

    - End-user awareness and knowledge gaps that could be hurting your cybersecurity defences
    - Impacts of phishing attacks and the ways infosec pros are trying to combat these threats
    - How Proofpoint customers are approaching phishing awareness training, and the ways we’re helping them measure success
    - Download our report to learn how organizations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence.

    Join us for an in-depth look at user awareness, vulnerability and resilience.

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Live Demo - Enterprise Information Archiving Recorded: Mar 31 2020 43 mins
    John Price, Sr. Archiving Sales Specialist and Mike Fenili, Sr. Sales Engineer
    Today’s businesses generate a lot of communications data, in a lot of formats and in a lot of locations, from computers and on-prem servers to mobile devices and the cloud. Developing a modern data archiving and compliance strategy isn’t easy, especially as regulations continue to evolve. How do you scale your infrastructure to accommodate the data growth and ensure your supervision teams can keep up?

    Join us for a live demo as we take an in-depth look at how Proofpoint solves the data archiving and compliance challenges of the modern enterprise.

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with evolving industry rules and regulations
    - Improve visibility into your archived data
  • Live Talks Series: March 30th Cyber Threat Updates - COVID19 Lures Recorded: Mar 30 2020 30 mins
    Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint
    Proofpoint’s Threat Intelligence team continues to detect credential phishing, malware, and even business email compromise (BEC) attacks, among others - all leveraging coronavirus lures. Join our bi-weekly Live Talks series with Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Ryan Kalember, EVP of Cybersecurity Strategy as they share the latest from the front lines of COVID-19 phishing.
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Recorded: Mar 26 2020 42 mins
    Joshua Whisnant, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Beyond the Phish: A Snapshot of End-User Behavior Recorded: Mar 26 2020 38 mins
    Paul Down, Senior Director, Proofpoint EMEA
    You're invited to our most exciting webinar of the year - Beyond the Phish: A snapshot of end-user behaviour!

    During this webinar, we will address key findings from our Beyond the Phish Report that explores end-user knowledge across topics such as cyber hygiene, security, and compliance. The report analyses millions of responses gathered from our Security Education Platform.

    Join us live to learn:
    • The importance of assessing and training end-users on cybersecurity threats beyond email-based social engineering
    • Common strengths and weaknesses among end-users across 14 cybersecurity topics
    • How to gain a holistic view of susceptibility by looking beyond knowledge assessments and training activities

    ---------------------------------------------

    BONUS! All attendees will receive a free download of Beyond the Phish, Proofpoint's most wide-ranging report on user knowledge of cyber-hygiene, security and compliance.

    ---------------------------------------------

    About Proofpoint

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Security Awareness Training – Your best line of defence ( APAC / APJ ) Recorded: Mar 26 2020 39 mins
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Live Talks: Securing Data & Access for Your Growing Remote Workforce Recorded: Mar 25 2020 49 mins
    Ryan Kalember, EVP Cybersecurity Strategy & Mike Stacy, Director of Advanced Technology Sales Engineering
    The 2020 cyber threat landscape has changed drastically just over the last month as more and more employees are mandated to work from home around the world. But in the rush to ensure business continuity, how you can keep your end users protected?

    Join our Live Talks conversational series with Proofpoint's experts Ryan Kalember, EVP of Cybersecurity Strategy and Mike Stacy, Director of Advanced Technology Sales Engineering as they discuss how you can keep users connected to the data and systems they need to do their job, without compromising how you protect your organization's most valuable assets.

    In this webinar, we'll share:
    - The keys to securely transitioning a remote workforce, and how to adapt your security control stack
    - Insight from the Proofpoint Threat Intel team into how threat actors are targeting newly remote workers
    - The free tools that Proofpoint is offering to help our customers stay secure as they move to a more remote workforce
  • Live Demo: A People-Centric Approach to Insider Threat Management Recorded: Mar 24 2020 29 mins
    Kevin Donovan, Sr. Solutions Architect
    Accordingly to McKinsey more than 50% of all data breaches are the result of insider threats. As more companies look to successfully transition to the cloud, traditional ways of protecting data and intellectual property aren’t enough. Context is key when incidents occur to understand intent from the user-perspective and enable a streamlined investigative process. So how is this achieved?

    Join this live demo as we discuss:

    · Methodologies that reduce investigation times by 60-90%
    · The value behind correlating user activity + data movement in insider related incidents
    · Communication techniques to measure risk when involving other business stakeholders
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access Recorded: Mar 24 2020 41 mins
    Chen Nisnkorn, Sr. Director of Technical Sales & Micha Rave, Sr Director Product Management
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Protecting Healthcare’s Greatest Cyber Security Risk Recorded: Mar 23 2020 48 mins
    Ryan Kalember, EVP Cybersecurity Strategy
    Health institutions need to look at cybersecurity the same way their attackers look at them - through the lens of their people. That starts by understanding who is healthcare’s very attacked people, or VAPs, and how they’re being attacked. In this session, you’ll hear sophisticated research outlining which healthcare job functions are most attacked and the controls that can be put in place to both identify and protect your people from malware, credential phishing, impersonation and insider threats across email and cloud.
  • Defend Your Cloud Data by Going on the Offensive with CASB Recorded: Mar 20 2020 50 mins
    Ryan Kalember, EVP of Cybersecurity Strategy of Proofpoint & Garrett Bekker, Principal Analyst of 451 Research
    The reasons for implementing cloud security access brokers have steadily moved from an original use case around discovery and asset inventory of SaaS applications to data loss prevention (DLP), monitoring user activity and adaptive access controls. Loss of in-house data control, data breaches, data residency and confidentiality are the top concerns for cloud applications and services.

    Join Garrett Bekker from 451 Research Group and Ryan Kalember, SVP of Cybersecurity at Proofpoint, as they discuss:

    - Top cloud security pain points
    - Need for preventative and responsive cloud security measures
    - Why a people-centric approach to cloud security is imperative
Proofpoint
Proofpoint is a next-generation cybersecurity company that protects the way people work today. At Proofpoint, we give organizations the power to do three critical things:

- First we protect people from the advanced attacks that target them via email, mobile apps, and social media
- Secondly we protect the information people create from advanced attacks and compliance violations, and
- Finally, we equip people to respond quickly when things go wrong.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Beyond the Phish: A Snapshot of End-User Behavior
  • Live at: Mar 26 2020 10:00 am
  • Presented by: Paul Down, Senior Director, Proofpoint EMEA
  • From:
Your email has been sent.
or close