Hi [[ session.user.profile.firstName ]]

Security Awareness Training –Your best line of defence

How susceptible are your users to email attack?
Join our experts to discover new highly-crafted lures and tricks used by cyber criminals in 2020.
Learn how to strengthen your last line of cyber defence : your people

Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.

So how can you better protect yourself, your organisation, and your end users?

With this webinar you’ll get a better understanding of:

• How to measure your susceptibility to attack through the number 1 threat vector, email.
• How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
• How to enable your employees to quickly report suspicious email messages with one tap
• How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)

Join us to review 2020 best practice in security awareness training

ABOUT PROOFPOINT
Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
Recorded Apr 14 2020 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Paul Down, Director & Matt Cooke, Cyber Security Specialist
Presentation preview: Security Awareness Training –Your best line of defence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Demo: Advanced People-Centric Cybersecurity for Cloud Applications Sep 30 2020 4:00 pm UTC 45 mins
    Craig Morell, Sr. Sales Engineer at Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric cybersecurity journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people and defend your data as your organization works with O365, G Suite, and other cloud applications
    - Leverage Proofpoint’s CASB solution to gain a centralized view of your cloud environment
    - Block threats associated with compromised accounts, risky third-party apps, and the misuse of valuable data
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Sep 22 2020 4:00 pm UTC 45 mins
    David Kleppick, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Ramping Up People-Centric Security for BEC & EAC Sep 16 2020 4:00 pm UTC 45 mins
    Craig Morell, Sr. Sales Engineer of Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric security journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people from impostor email attacks, like business email compromise (BEC)
    - Investigate and respond to the risks of email account compromise (EAC), including internal email threats sent from compromised accounts
    - Prevent risks associated with personal webmail and risky websites sent via corporate email
  • Live Demo: Foundations of People-Centric Cybersecurity for Email Sep 2 2020 4:00 pm UTC 45 mins
    Dustin Anderson, Senior Sales Engineer, Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric security journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people from the #1 threat vector that attackers use today: email
    - Gain visibility into which people are being attacked, how they’re being attacked, and whether they’re compromised
    - Build a robust security awareness training program
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Aug 20 2020 4:00 pm UTC 45 mins
    Jacob Kennedy, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo Protect Your Data. Reduce Insider Threat Risk. Aug 6 2020 6:30 am UTC 60 mins
    Shlomi Saki, Director & Damian Skeeles, Principle Sales Engineer, Proofpoint ANZ
    Insider threats are quickly becoming one of the biggest cybersecurity threats that organizations face today. According to the 2020 DBIR Report, 30% of all data breaches breaches originated with insiders in the past year.
    Insider threats are so common because anyone with legitimate, trusted access to an organization’s systems and data – whether it’s careless users, disgruntled employees or compromised accounts – can become an insider threat.
    Join Damian Skeeles and Shlomi Shaki from Proofpoint Insider Threat Management to discover how easy it can be to protect your data and reduce the risk of insider threats.
    In this webinar you will learn:
    • How to better understand and respond to insider-caused data breaches
    • What it takes to effectively prevent data loss in the modern enterprise
    • Methodologies to reduce investigation times by 60-90%
  • Email fraud puts every email-based relationship at risk. Jul 30 2020 9:00 am UTC 60 mins
    Neil Hammet, Senior Product Evangelist, Email Fraud Defence & Chris Clarke, Email Fraud Defence
    Authenticate Your Email with Confidence
    Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email scams are also preventable.

    Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains.

    Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block email scams before they reach your employees, customers, and business partners.
    - Find out why 30% of the Fortune 1000 are fixing the number one vulnerability in email with Proofpoint Email Fraud Defense
    - Learn how to avoid the €2M loss that SS Lazio suffered as a result of this vulnerability
    Neil Hammet, our resident EMEA Email Fraud Evangelist will be running this session
  • Live Demo: People-Centric Cloud Security with Contextual & Risk-Aware DLP Jul 29 2020 5:00 pm UTC 45 mins
    Kris Ahlstrom, Managing Solutions Architect
    Adjusting to more work-from-home means evolving your security practices to reflect today’s reality - that people are at the center of everything. What you need is a security partner who builds solutions from the ground up to protect people and their data.

    Join us for a live demo of Proofpoint’s Cloud Access Security Broker (CASB) and other products from Proofpoint. We’ll show you how you can benefit from this approach including:

    - Correlation of Cloud Account Takeover with Email Threats
    - Tracking of post-login suspicious activities including data planting and exfiltration
    - Creation of contextual and risk-aware data security policies
    - Rising threat of third-party applications to your data and systems
  • Comment traiter les menaces internes grâce à l'approche centrée sur le personne Jul 23 2020 12:00 pm UTC 60 mins
    Gaëtan Gesret, Systems Engineer, Proofpoint France
    Les menaces internes sont à l'origine de vols de données à hauteur de trois millions d'enregistrements par jour en moyenne. Elles ont également été la cause de 57 % de toutes les compromissions de bases de données au cours de l'année écoulée (Verizon, 2019).

    Pourquoi sont-elles aussi fréquentes ? Toute personne disposant d'un accès légitime et approuvé aux systèmes et données d'une entreprise, qu'il s'agisse d'un collaborateur à temps plein, d'un prestataire externe à temps partiel ou d'un partenaire stratégique, peut devenir une menace interne. Comment les entreprises peuvent-elles y faire face ?

    Découvrez l’approche centrée sur les personnes proposée pat ObserveIT, une division de Proofpoint pour gérer les menaces internes.

    Au programme :

    • L'importance du contexte : comment une visibilité totale offre le contexte nécessaire pour comprendre et limiter les menaces internes, sans sacrifier la conformité et la confidentialité des utilisateurs
    • Types de menaces : les différents types de menaces internes et les mesures que vous pouvez prendre pour élaborer votre propre programme de gestion de ces menaces
    • Démonstration en direct : une démonstration en direct expliquant comment les activités contraires aux règles définies sont détectées et immédiatement analysées
  • Protecting Your Data Against the Insider Threat Risk Jul 23 2020 9:00 am UTC 60 mins
    Rob Bolton and Lee Duff Insider Threat Management specialists, Proofpoint
    As the workforce rapidly shifts to remote work, the complexity of protecting IP and sensitive data has grown exponentially. Old models of locking down the perimeter no longer apply. Instead, a modern, people-centric approach to Insider Threat Management can complement existing information protection programs, while providing greater visibility and context into both user behaviour and data movement.

    Join us in a 30-mins Live Talk with Proofpoint’s Rob Bolton and Lee Duff Insider Threat Management specialists as they discuss:

    - The types of insider threat profiles and how to address them. For example, organizations may not know how that more than 60% of insiders are negligent.
    - Why insider threats are unique and require context into both user and data activity. 
    - How to reduce response time by accelerating investigations. The longer the response times, the costlier an incident can get.
    - And more!
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access Jul 23 2020 6:30 am UTC 60 mins
    Etay Bogner, VP and GM Zero Trust Product and founder of Meta Networks
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Jul 21 2020 4:00 pm UTC 45 mins
    Jacob Kennedy, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • How Imposter Attacks Have Become an Imposing Threat to Healthcare Jul 15 2020 5:00 pm UTC 60 mins
    Ryan Witt, Sr. Director of Healthcare & Brett Shaw, Sr. Product Marketing Manager at Proofpoint
    The 2019 HIMSS Cybersecurity Survey indicated that email is the initial point of compromise for healthcare cyber-attacks, with cybercriminals increasingly favoring Business Email Compromise (BEC) as a primary tactic. Because BEC emails do not carry malicious payload and are narrowly targeted, it’s difficult for health institutions to detect these attacks. In 2020, cybercriminals are even more focused on BEC attacks, with information related to COVID-19 being the primary lure.

    Join us for a deep analysis of BEC and how you can better protect your patients, healthcare workers, and business admins. In this session, we'll cover:

    - The cybersecurity challenges currently facing healthcare
    - How COVID-19 has become the primary focus of cybercriminal activities
    - Tips on how the industry can protect itself against these attacks
  • Live Panel cybersécurité avec Le Groupe Fives, Ilex International et Proofpoint Jul 15 2020 9:00 am UTC 60 mins
    Kelig Dugue, RSSI Groupe FIVES Loïc Guézo, Cybersecurity Strategy, Guillaume Guerrin Ilex
    Comment le groupe Fives a associé gestion des accès et sécurisation des données à ses applications cloud avec Ilex et Proofpoint ? - Français

    Kelig DUGUE, RSSI du Groupe FIVES, groupe international d’ingénierie industrielle comptant plus de 8 400 collaborateurs dans une trentaine de pays, sera l’invitée principale de ce webinar. Nous vous donnons rendez-vous le 9 juillet 2020 à 11h.

    Au cours de cette session, nos intervenants partageront :
    • Le retour d’expérience de Kelig Dugue, illustrant comment le groupe industriel contrôle, sécurise et surveille l’ensemble des accès de ses utilisateurs à son SI et leurs données exploitées dans le cloud ;
    • La démarche collaborative entre les équipes Proofpoint et Ilex International pour répondre aux besoins du Groupe FIVES en matière de protection de ses actifs.
  • A Modern People-Centric Approach to Managing the Risk of Insider Threats Recorded: Jul 9 2020 50 mins
    Josh Epstein, VP of Marketing for ITM & Nirav Shah, Dir. of Product Management at Proofpoint ITM
    With an increasingly distributed workforce, insider threats are on the rise. In fact, the Verizon DBIR 2020 found 30% of all data breaches are insider-caused. It’s time to change the way organizations address insider threats.

    There is a significant need in the market for a modern, purpose-built Insider Threat Management solution that puts people at the heart of security strategy. It’s never been more important for ITM solutions to deliver fast time to value, reduce mean time to detect and mean time to resolve, and speed up investigations. Moreover, the ubiquity of the cloud and SaaS tools across the modern organization means that any ITM program must be scalable and extensible.

    In this webinar, we’ll share actionable strategies to manage insider threat risk, including the value of a technology-enabled ITM program. We’ll also demonstrate the new and improved ObserveIT Insider Threat Management Platform.

    In this session, you’ll learn:

    - Why people-centric security is the way forward in our “new normal” work world
    - What it takes to build a successful and sustainable Insider Threat Management program
    - The power of correlation and context when it comes to reducing Insider Threat risk
  • Educating Your People Against Cybercriminals Latest Tactics Recorded: Jul 9 2020 36 mins
    Paul Down, Director, Proofpoint EMEA & Matt Cooke, Cybersecurity Specialist, Proofpoint EMEA
    Cybercriminals continue to leverage uncertainty and fear to launch malicious campaigns with one aim in mind – to get your people to click. And, while remote working and collaboration via digital platforms has become the new normal for many of us, criminal motivations haven't shifted quite so dramatically. It's their opportunity and attack surface that has just increased.

    Join us in a 30-mins Live Talk with Paul Down, Senior Security Awareness Specialist and Matt Cooke International Cybersecurity Specialist at Proofpoint as they discuss:

    - How to take security awareness beyond just threats and phishing and use it to help your people adapt to the new normal, securely
    - How we to educate so people understand their role in protecting not only your organisations data, but also personal and family data against those threats
    - How we can use security awareness training metrics to better understand and respond to organisational risk.

    At the end of this session we’ll be providing you the opportunity to take our free People Risk Assessment and see how you compare with other companies in your industry.
  • Staying Ahead Of Cybercriminals With The Latest From The Threat Landscape Recorded: Jul 2 2020 36 mins
    Richard Davis, International Cybersecurity Specialist & Davide Canali, Threat Analyst
    Discover how in 2020 Coronavirus-related email lures became the greatest collection of attack types united by a single theme that the Proofpoint Threat Research and Detection team had seen in years, if not ever.

    Register below and join Davide Canali, Threat Analyst and Richard Davis, International Cybersecurity Strategist, in a 30-mins Live Talk, as they share:

    - The current state and rapid evolution of COVID-themed phishing campaigns
    - Key defence mechanisms to reduce your organization's risk
    - Awareness and training measures you can take to keep your users from falling victim
  • Gérer l’impact d’une pandémie sur l’entreprise en qualité de RSSI - Français Recorded: Jun 30 2020 36 mins
    Fabrice Bru, RSSI, Administrateur du CESIN, Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint
    Les cybercriminels continuent d'exploiter nos craintes et nos incertitudes au moyen de campagnes malveillantes dont l'unique objectif est de nous inciter à cliquer sur des liens dangereux pour notre sécurité.

    Ces attaques visent directement les personnes et recourent à des techniques d'ingénierie sociale. De plus, la situation exceptionnelle que nous vivons aujourd'hui nous oblige à nous adapter rapidement et à adopter massivement le télétravail, une transition qui expose nos utilisateurs à davantage d'attaques, du phishing au piratage de la messagerie en entreprise (BEC, Business Email Compromise).

    Et tandis que les cybercriminels continuent de prendre pour cible nos collaborateurs, le rôle des RSSI évolue de façon inédite. Comment les RSSI et les équipes de sécurité peuvent-ils s'adapter pour mieux protéger l'entreprise en cette année difficile ?

    Fabrice Bru, RSSI, Administrateur du Club des Experts de la Sécurité de l'Information et du Numérique (CESIN), et Loïc Guézo, Senior Director, Cybersecurity Strategy de Proofpoint, font le point avec vous lors d'une intervention Live Talk de 30 minutes.

    Au programme :

    L'impact de la pandémie et l'évolution des campagnes de phishing exploitant le thème du COVID-19
    Partage de l'expérience d'un groupe de RSSI qui ont collaboré pour adapter leurs programmes de sécurité afin de garantir une utilisation sûre et productive de l'environnement numérique, malgré la pandémie
  • Navigating Through a Pandemic as a CISO, and Beyond Recorded: Jun 30 2020 29 mins
    Fabrice Bru, RSSI, Administrateur du CESIN, Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint
    Cybercriminals continue to leverage uncertainty and fear to launch malicious campaigns with one aim in mind – to get your people to click. These attacks are targeted at people and require social engineering to succeed. What’s more, the disruption we are all facing today has forced us all to quickly adapt, move to a WFH environment and potentially exposing our users to increased attacks – from phishing to business email compromise attacks.

    While the cybercriminals remain busy in their pursuit of exploiting our employees, the CISOs role has been pushed to new limits. So how must CISOs and their security teams evolve to better protect your organisation this year?

    Join Fabrice BRU, CISO, Administrator of ‘Club des Experts de la Sécurité de l’Information et du Numérique’ (CESIN) and Loïc Guézo, Senior Director, Cybersecurity at Proofpoint as they share real life experiences on how this community of CISOs have joined together to update their security programmes to ensure we thrive in this digital-first world, despite the pandemic.
  • Live Demo- How to Combat Email Account Compromise (EAC) with Proofpoint Solution Recorded: Jun 25 2020 46 mins
    Sara Pan, Sr. Product Marketing Manager & Bo Mendenhall, Cloud Security Solutions Architect of Proofpoint
    Email Account Compromise (EAC) is often associated with business email compromise (BEC) because compromised email accounts are used in a growing number of BEC-style scams. Attackers use various tactics, such as password spay, phishing, or malware, to compromise an email account. And once they’re in, they can phish internally or launch another BEC attack. So how can you better protect your company and end users?

    Join this live demo webinar and learn more about the following:

    - How does EAC work
    - Real-life examples of EAC attempts
    - How does Proofpoint detect and stop EAC attempt
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Awareness Training –Your best line of defence
  • Live at: Apr 14 2020 2:00 pm
  • Presented by: Paul Down, Director & Matt Cooke, Cyber Security Specialist
  • From:
Your email has been sent.
or close