Hi [[ session.user.profile.firstName ]]

Email Security: Why Now Is The Time To Review Your Strategy

Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

Join us to gain insights into:
How the email threat landscape has changed with attackers evading legacy approaches;
How leaders like Proofpoint have innovated to keep up;
Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
Recorded Apr 21 2020 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist
Presentation preview: Email Security: Why Now Is The Time To Review Your Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Detect & Stop Email Fraud in Your Supply Chain​ Mar 23 2021 2:00 pm UTC 45 mins
    Matt Cooke, CyberSecurity Specialist, Proofpoint
    Most companies depend on a variety of external vendors and partners to support their business. These interdependent relationships form a multi-faceted third-party ecosystem called the supply chain. Because of its complexity, the supply chain is an attractive target for cybercriminals.

    Where a scam targets the supply chain, the organisation will suffer substantial losses, both in time and money, in particular the subsequent costs to resolve the problem and repair the damage. Supply chain fraud attacks leverage both impersonation through Business Email Compromise (BEC) and Email Account Compromise (EAC). Has your organisation assessed the cybersecurity risks from your supply chain? How can you better protect your company?

    In this 30-mns insightful session, you will learn:

    Real-world supply chain fraud examples.
    Grading risk in your suppliers.
    How to detect threats, including payroll diversion and supplier invoicing fraud.
    How to stop these multi-million-dollar email fraud attack
  • Cloud Security Threat - Cloud Monitoring and Breach Prevention Mar 16 2021 11:00 am UTC 60 mins
    James Johnson, Cloud Security Specialist, Proofpoint
    In this session we explore the threats associated with cloud security, breach monitoring and prevention. We also explore how organizations can protect themselves both from a denial of service, information leak, data theft.

    With all the limitations of traditional security architectures, we explain how a CASB with Unified Information Protection can achieve cloud & data security detection through to remediation.

    Significantly improving enterprise security, bridging the gap between cloud and information security.

    After this presentation, attendees will:
    - Understand the core principles of people-centric cloud security, and why it’s important to adopt them now.
    - How enterprises can achieve a unified, layered defence to cloud and resultant data impact issues.
    - Understand how their organization can adapt a people-centric cloud security strategy, integrating with and enhancing their infrastructure.
  • Cloud Originated Ransomware Attacks Mar 2 2021 2:00 pm UTC 45 mins
    Ed Rowley, Director & Dan Marley-Cook, Technical Manager
    Ransomware is an old threat that persists as a modern-day problem. This type of malware – which gets name from the payment it demands after locking away or threatening to expose victims' files – is a major issue for any organisation that relies on IT. And as organisations move into the cloud, Ransomware is becoming one of today’s most disruptive types of cyberattacks, putting victims out of business, forcing hospitals to turn away patients, and bringing entire city governments to a standstill.

    Join us in this webinar, as Proofpoint cybersecurity experts dissect how cloud originated ransomware attacks have become a proven money maker for cybercriminals and how you can better protect your company’s cloud environment.

    In this 30-mns insightful session, you will learn:

    How to protect against the new wave of Malicious Integrated Apps.
    How to detect ransomware and malware using augmented security in addition to native O365 security.
    Deep dive into new variant Employer 21 Ransomware, QBot malware, & Remcos RAT infestation.
  • Live Demo: How to Detect & Stop Email Fraud in Your Supply Chain Recorded: Feb 24 2021 32 mins
    Ash Valeski, Email Fraud Defense Solutions Director, Proofpoint
    Email fraud often starts with an email in which the attacker poses as someone the victim trusts. The message makes a seemingly legitimate business request that usually leads to wire transfer or financial payment. Unfortunately, most organizations don’t have visibility into the risk posed by their suppliers. So how can you better protect your company?

    Watch this live demo to learn more about how attackers are going after your suppliers and how you can mitigate your risk of email fraud. We cover:

    - How does supplier invoicing fraud work
    - How Proofpoint addresses common email fraud use cases
    - How Proofpoint helps mitigate risk from risky suppliers
  • Approaches to Managing Insider Risk in a Work-from-Anywhere World Recorded: Feb 23 2021 60 mins
    Sai Chavali,Sr PMM,Proofpoint; Mirtha Collin,Ed Dir,(ISC)²; Spencer Wilcox,CSO, ED of Tech; Brandon Dunlap,Moderator
    With the massive shift to remote working in 2020, organizations are racing to rethink their security programs to both guard from external attacks as well as manage risk from insiders. Modern approaches to insider threat management must incorporate investments in People, Process, and Technology. This means formalized insider threat management programs; it means investment in insider threat management technologies; and it means building resilience into the fabric of your organization with training.

    Join Proofpoint and (ISC)2 on February 23, 2021 at 1:00pm Eastern as we kick off the new year with a discussion about security awareness, education and insider threat management and how best to defend your organization and arm your users to mitigate an insider incident.
  • Cyberthreat Game Changer: A New Look at Insider Threats Recorded: Feb 23 2021 62 mins
    Rob Bolton, Sen Dir, Proofpoint Information Protection; Brandon Dunlap, Moderator
    With the massive shift to remote working in 2020, organisations are racing to rethink their security programs to both guard against external attacks and manage insider risk. Many organisations treat these two issues as equal, when the people-centric nature of insider threats requires an entirely different approach.

    Modern approaches to insider threat management must account for accidental, compromised and malicious insiders. These trusted insiders can be employees, partners or third-party contractors. A critical challenge is building practical, technology enabled insider threat management programs that account for these different insider threat types, while protecting against potential data and intellectual property loss.

    Join Proofpoint and (ISC)2 on February 23, 2021 at 13.00 GMT for a live discussion about insider threat management and how best to mitigate insider risk. Rob Bolton, Sr Director at Proofpoint Information Protection and Brandon Dunlap will be discussing:

    - The unique risks of insider threats and how to protect against data loss
    - Practical tips inspired by real-world breaches
    - How to take a people-centric approach to strengthen resilience and reduce insider risk
  • Information Protection & Compliance for Microsoft 365 Recorded: Feb 17 2021 31 mins
    Itir Clarke, Senior Product Marketing Manager, Amanda Anderson, Product Marketing Manager, John Checco, Resident CISO
    Cloud-based productivity tools like Microsoft 365 keep your business operating, especially in today’s digital-first environment. Yet securing data and adhering to data privacy, record keeping, and other communications regulations can be a significant challenge.

    In this webinar, Proofpoint’s resident CISO, John Checco leads a 30-minute discussion about how your peers are addressing these challenges and the steps you can take to ensure compliance across your Microsoft ecosystem.

    This session covers:

    - Common privacy and compliance challenges and pitfalls when it comes to Microsoft 365
    - How your capture and archive strategy can augment your information protection program
    - How Proofpoint’s people-centric approach to security and compliance can help you
  • Driving Real Behaviour Change: Build a Security Awareness Program that Works Recorded: Feb 16 2021 36 mins
    Paul Down, Director & Matt Cooke, Cybersecurity Specialist, Proofpoint EMEA
    When it comes to modern Cybersecurity – ultimately your users are your last line of defence. So you need to arm them with both knowledge and practice to mould dynamic, alert guardians of both your organisation and your data. The key to your success is engaging, entertaining - and crucially - topical security awareness training.

    So where to start, or how to renew your program? Are you one of the 80% of organisations who allocate two hours or less per year for security awareness, how useful do you judge this small amount of user training to effect behaviour change?

    Join our Security Awareness Training experts as we review valuable strategies on how to create and sustain an impactful cybersecurity awareness education program. Plus we delve deep into thought-leadership on the following questions:

    - How do I ensure my users embrace the training? Who are the key influencers internally?
    - What is the minimum – and maximum – levels of training shown to have been successful?
    - How do I motivate and reward my last line defenders?
    - What reporting and measures are the most pertinent to the IT team and alternatively to the C-suite?
  • Ein überfälliger Wechsel zu einer personenzentrierten Sicherheit Recorded: Feb 16 2021 31 mins
    Markus Grüneberg, Resident CISO, IT Security & Data Privacy Advisor, Proofpoint
    Die digitale Transformation zeigt immer schneller ihre Auswirkungen auf die Arbeitswelt und beeinflusst immer stärker die Cybertrends.
    Auch Ihr Unternehmen hat Ressourcen der Rechenzentren zunehmend ausgelagert und das Arbeiten an entfernten Standorten ermöglicht. Ihre Mitarbeiter sind der neue Perimeter!

    Wissen Sie genau, wann oder wie Ihre Führungskräfte ins Visier genommen werden? Wissen Sie, wer die Personen in Ihrer Organisation sind, die am häufigsten im Cyberspace angegriffen werden?
    Sind Ihre häufig angegriffenen Personen – die sog. „very attacked people“ (VAPs) dieselben wie Ihre “very important people” (VIPs)? Und wissen Sie, wie sich die Verhaltensschwachstellen und Zugangsprivilegien Ihrer „VAPs“ überschneiden?
    Mehr als 99% aller gezielten Cyber-Angriffe nutzen eher menschliche Fehler als Systemfehler aus.

    Sie sollten das größte Kapital Ihres Unternehmens schützen: Ihre Mitarbeiter und die Daten, auf die sie Zugriff haben. Sie sollten Einblick in die riskanten Verhaltensweisen haben, die darauf hindeuten, dass Ihre Mitarbeiter auf einen modernen, sog. Social Engineering Angriff hereinfallen könnten.
    Die einzige Möglichkeit, die heutigen fortschrittlichen Angriffe erfolgreich zu bekämpfen, besteht darin, sich auf den Schutz Ihrer Mitarbeiter zu konzentrieren.

    In diesem Vortrag werden Markus Grueneberg von Proofpoint, erklären:

    - Arten von externen und internen Bedrohungsprofilen
    - warum der Übergang zu einer auf die Person ausgerichtete Sicherheit relevant, dringend und längst überfällig ist
    - Einführung der neuen, von Personen ausgehende Bedrohungsinformationen, die erforderlich sind, um Ihre personenzentrierte Cyber-Sicherheitsstrategie zu priorisieren, umzusetzen und weiterzuentwickeln.
  • Une sécurité centrée sur les personnes : un changement attendu depuis longtemps Recorded: Feb 16 2021 29 mins
    Loïc Guézo Directeur Senior, Stratégie Cybersécurité, chez Proofpoint et Antoine Bajolet, RSSI, Membre de CLUSIF
    Alors que votre organisation externalise de plus en plus ses centres de données et permet le travail à distance, vos collaborateurs constituent votre nouveau périmètre de sécurité. Mais savez-vous quand et comment vos cadres sont ciblés ? Vous connaissez vos VIPs mais qui les VAPs (Very Attacked People) de votre organisation ? Et savez-vous comment réduire leur vulnérabilité et gérer leurs privilèges afin de protéger les éléments précieux auxquels ils ont accès ?

    Plus de 99 % de toutes les cyberattaques ciblées exploitent des erreurs humaines plutôt que des failles du système. Vous devez protéger les principaux atouts de votre entreprise, à savoir ses collaborateurs et les données auxquelles ils ont accès. Par conséquent, avoir la visibilité sur les comportements à risque de vos collaborateurs est primordiale.

    Durant cette présentation, Loïc Guézo Directeur Senior, Stratégie Cybersécurité, chez Proofpoint et Antoine Bajolet, RSSI, Membre de CLUSIF vous expliqueront :

    •quels sont les types de menaces externes et internes auxquels vous devez faire face
    •pourquoi le passage à une sécurité centrée sur les personnes est pertinent, urgent et attendu depuis longtemps
    •comment introduire la Threat Intelligence pour établir des priorités, mettre en œuvre et faire évoluer votre stratégie de cybersécurité centrée sur les personnes
  • State of the Phish Report 2021 Recorded: Feb 12 2021 103 mins
    Gretel Egan, Sr. Security Awareness Training Strategist at Proofpoint, Kurt Wesco, CTO at Proofpoint
    Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention? This webinar covers Proofpoint’s seventh annual State of the Phish report which delivers critical, actionable insights into the current state of the phishing threat. Our experts take a deep dive into:

    - The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses.
    - The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
    - How organizations are delivering phishing awareness training, and the ways they measure program success
  • 5 Steps to Building a Successful Cloud DLP Solution Recorded: Feb 12 2021 33 mins
    Itir Clarke, Senior Product Marketing Manager, Spencer Colemere, Product Manager
    The new reality of cybersecurity revolves around information protection. Security teams must protect remote workers, the cloud apps they use, and the data they access. Is your cloud DLP solution up to the challenge?

    This 30-minute webinar dives into best practices for cloud DLP. We will cover:

    - The people-centric future of Information Protection
    - The content, threat, and behavior telemetry needed to address the full spectrum of data loss scenarios
    - 5 steps to building a successful cloud DLP solution
  • Five Archiving & Compliance Rules for O365 Email, Teams, Zoom or Slack in 2021 Recorded: Feb 11 2021 50 mins
    Michael McGrath, Graham Ashworth & Richard Davis, Proofpoint EMEA
    Collaborative technology came of age in 2020, with rapid adoption and overarching reliance on Zoom, Teams, Slack and/or Skype. Beyond the humble email, these have all become crucial tools for business activity.

    2021 will be no different and these collaboration tools are here to stay. This opens up a series of new challenges for organisations, as existing supervision and e-discovery capabilities need to be extended to these platforms, to ensure compliance with all current international legislation.

    So whether you are wondering how do you archive all comms including email in 2021, have challenges in accessing that archive quickly and efficiently or still unsure if you are meeting all compliance requirements, this session is just what you need…

    Join us in this live discussion with leading Archiving and Compliance experts as they dive deeper into:

    The use of Outlook 365 archive and when does this need to be augmented.
    What to consider when reappraising content & comms compliance.
    What do you need to future proof existing archiving and compliance systems for the demands of tomorrow.
  • 2021 State of the Phish Report Recorded: Feb 10 2021 60 mins
    ISSA International
    Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention? Join this webinar for Proofpoint’s seventh annual State of the Phish report as it delivers critical, actionable insights into the current state of the phishing threat.

    Our experts will deep dive into:

    - The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses.
    - The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
    - How organizations are delivering phishing awareness training, and the ways they measure program success
  • Case Study: Defend Against Email Fraud in Your Supply Chain Recorded: Feb 9 2021 45 mins
    Jeff Henze, Information Security Analyst, Nathan Thoenen, Security Engineer, Sara Pan, Sr. Product Marketing Manager
    Email fraud continues to be a top concern for CISOs in 2021 - especially email fraud within supply chains. So how can you better protect your company?

    Our case study webinar dives into how Jeff Henze, Information Security Analyst at Shelter Insurance, and Nathan Thoenen, Security Engineer at Prime Inc., detect and stop attacks that leverage both impersonation and account compromise. In this 45-minute session, our panelists discuss:

    - Their challenges with supplier email fraud
    - How they are tackling email fraud attacks
    - What security controls & programs can help mitigate your risk
  • Healthcare Threat Intelligence Briefing Recorded: Feb 9 2021 32 mins
    Ryan Witt, Managing Director, Healthcare Industry Practice at Proofpoint
    The healthcare cyber threat landscape drastically changed over the past year as health-related email lures plagued the industry. The 2020 HIMSS Cybersecurity Survey indicated that 89% of healthcare cyber attacks had email as the initial point of compromise. So what should you be watching for in 2021?

    Listen in on Ryan Witt, Managing Director, Healthcare Industry Practice at Proofpoint discuss the unique risks of healthcare threats and how to protect your healthcare organization from cyber criminals during this 30-min Threat Intelligence Briefing. We discuss:

    - Recent attacks and trends in the healthcare space
    - Social engineering tactics used by cyber criminals to launch their exploits
    - Controls to put in place to better protect those targeted by these sophisticated attacks
  • 3 Ingredients for Successfully Deploying Social Media Channels Recorded: Feb 3 2021 44 mins
    Shane Sauer, Proofpoint, Davis Riar, Hootsuite, Scott Rogerson, UpContent
    The world has gone digital in the wake of the pandemic, and social media has become a critical communication channel for businesses. To get the right results and protect your business from risk, you need to do more than just unleash your employees.

    In this webinar, experts from Proofpoint, Hootsuite, and Upcontent discuss how to successfully enable your employees to represent your business on social media channels: content curation, social reach, and compliance. Our speakers cover strategies for:

    - Curating content that will resonate with your audience
    - Boosting your social reach with a robust employee advocacy program
    - Ensuring employee activity complies with regulations and corporate governance policies
  • A People-Centric Security Model for Financial Services Recorded: Feb 2 2021 31 mins
    John Checco, Proofpoint Resident CISO, Sean O'Dowd, Proofpoint Director of Financial Services Solutions
    For financial services firms, many cyber incidents and fraud is the result of errors, oversights, or deliberate mischief of individual employees. Whether cyber threats are user or attacker-enabled, companies need to focus not only on technical offenses but also human defense tactics. So how can you better protect your company in 2021?

    During this webinar, our experts look at how financial services firms are making strides in enabling users and improving security posture by applying a people-centric security model. We discuss:

    - The elements of a people-centric model in financial services
    - Examples of observed threats in the sector
    - Guidance on people-centric program implementation and tactics
  • 2021 Cyber Threat Landscape Recorded: Jan 29 2021 58 mins
    Tim Choi, VP Product Marketing, Sherrod DeGrippo, Sr. Director, Threat Research and Detection, Proofpoint
    Every year, Proofpoint’s threat research team examines trends from the prior year and looks ahead for changes in the threat landscape for the year to come. For 2021, some of the top concerns include an increase in blending email and cloud threats as a new form of social engineering while preventing insider threats and data loss in the new normal.

    Join Proofpoint’s experts for a deep dive into the potential evolution of cybersecurity for 2021 and how you can prepare and protect your most valuable assets: your people and your data.

    We’ll cover:

    - Evolution of the threat landscape for 2021
    - Key actions you can take to prepare your organization
    - Top resources to help support your security efforts
  • Reimagine Data Privacy with Threat-Aware DLP Recorded: Jan 27 2021 29 mins
    Mike Stacy, Global Cloud and Information Protection Director, Itir Clarke, Senior Product Marketing Manager, Proofpoint
    Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Challenges like increasing threat activity, difficulty protecting a remote workforce, and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations. So how can you better manage compliance risk in 2021?

    Join us as we discuss how you can reimagine data privacy with a modern approach to information protection. In this session, we will cover:

    - How to more easily conform to privacy regulations with modern detection and controls
    - Using threat-aware DLP to enhance data protection
    - How Proofpoint is innovating with our Information Protection Platform
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Email Security: Why Now Is The Time To Review Your Strategy
  • Live at: Apr 21 2020 9:00 am
  • Presented by: Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist
  • From:
Your email has been sent.
or close