Hi [[ session.user.profile.firstName ]]

Security Awareness Training – Your best line of defence

Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
So how can you better protect yourself, your organisation, and your end users?
Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
• How to measure your susceptibility to attack through the number 1 threat vector, email.
• How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
• How to enable your employees to quickly report suspicious email messages with one tap
• How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
Recorded May 26 2020 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Andrew Warren-Nicholls, Cyber Security Specialist, APJ
Presentation preview: Security Awareness Training – Your best line of defence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Demo: Advanced People-Centric Cybersecurity for Cloud Applications Sep 30 2020 4:00 pm UTC 45 mins
    Craig Morell, Sr. Sales Engineer at Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric cybersecurity journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people and defend your data as your organization works with O365, G Suite, and other cloud applications
    - Leverage Proofpoint’s CASB solution to gain a centralized view of your cloud environment
    - Block threats associated with compromised accounts, risky third-party apps, and the misuse of valuable data
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Sep 22 2020 4:00 pm UTC 45 mins
    David Kleppick, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Ramping Up People-Centric Security for BEC & EAC Sep 16 2020 4:00 pm UTC 45 mins
    Craig Morell, Sr. Sales Engineer of Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric security journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people from impostor email attacks, like business email compromise (BEC)
    - Investigate and respond to the risks of email account compromise (EAC), including internal email threats sent from compromised accounts
    - Prevent risks associated with personal webmail and risky websites sent via corporate email
  • Live Demo: Foundations of People-Centric Cybersecurity for Email Sep 2 2020 4:00 pm UTC 45 mins
    Dustin Anderson, Senior Sales Engineer, Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric security journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people from the #1 threat vector that attackers use today: email
    - Gain visibility into which people are being attacked, how they’re being attacked, and whether they’re compromised
    - Build a robust security awareness training program
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Aug 20 2020 4:00 pm UTC 45 mins
    Jacob Kennedy, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • デモンストレーション: ユーザーの行動をプライバシーを守りながら可視化する内部脅威対策 ObserveIT Internal Threat Management Aug 11 2020 7:30 am UTC 60 mins
    シニア セールスエンジニア 田中 晴也 (Sr. Sales Engineer Seiya Tanaka, Proofpoint Japan)
    情報漏えいの原因は、内部からの情報漏えいが約半分を占めており、その被害額は過去3年で倍増しています。
    IPAでも2020年の10大脅威で内部不正は2位にとりあげられており、特に日本では内部犯行による被害が他の国よりも多いというデータもでています。
    Withコロナで在宅勤務も広がる中、遠隔から仕事をする従業員の「人の信頼性の確認」が重要視されています。
    人々が分散環境で働く中、従来の境界防御だけでは組織を守れなくなりました。むしろゼロトラストベースで、内側からの脅威にも対応しなければなりません。
    本ウェビナーでは、すでに1,200社以上のお客様にご利用いただいているObserveITをご紹介します。ObserveITで、どのようにユーザーの行動からリスクを特定し、リアルタイムに抑止をかけ、データの漏えいを防ぐことができるかをご覧いただけます。
  • Live Demo Protect Your Data. Reduce Insider Threat Risk. Aug 6 2020 6:30 am UTC 60 mins
    Shlomi Saki, Director & Damian Skeeles, Principle Sales Engineer, Proofpoint ANZ
    Insider threats are quickly becoming one of the biggest cybersecurity threats that organizations face today. According to the 2020 DBIR Report, 30% of all data breaches breaches originated with insiders in the past year.
    Insider threats are so common because anyone with legitimate, trusted access to an organization’s systems and data – whether it’s careless users, disgruntled employees or compromised accounts – can become an insider threat.
    Join Damian Skeeles and Shlomi Shaki from Proofpoint Insider Threat Management to discover how easy it can be to protect your data and reduce the risk of insider threats.
    In this webinar you will learn:
    • How to better understand and respond to insider-caused data breaches
    • What it takes to effectively prevent data loss in the modern enterprise
    • Methodologies to reduce investigation times by 60-90%
  • Insider Threats and Hunting the Enemy Within Aug 3 2020 8:00 pm UTC 60 mins
    Shawn Fleury (Crypsis Group), Gabe Gumbs (Spirion), Sai Chavali (Proofpoint), Lisa Plaggemier (MediaPRO)
    Insider threats - whether they are current or former employees, contractors or partners with access to company systems or data who use that access maliciously or unintentionally - account for 60 percent of cyber attacks. 
    Insider threats are difficult to detect, and in many cases they can go unnoticed for months or years. In fact, detecting an internal threat is one of most difficult and ungrateful tasks for security teams in the organization. 

    Join this panel of security experts as they discuss insider threat hunting techniques and recommendations for safeguarding the enterprise against internal and external threats.

    - Why are insider threats so dangerous
    - Technical and human factor challenges 
    - How to detect and prevent malicious insider activity
    - How to keep the biggest threats to your organization at bay

    Speakers:
    Shawn Fleury, Director of Risk Management, The Crypsis Group
    Gabe Gumbs, Chief Innovation Officer, Spirion
    Sai Chavali, Sr Product Marketing Manager, Proofpoint Insider Threat Management
    Lisa Plaggemier, Chief Strategy Officer, MediaPRO
  • Securing Data & Access for Your Growing Remote Workforce Aug 3 2020 4:30 pm UTC 30 mins
    Nathan Chessin & Tim Choi (Proofpoint)
    The 2020 cyber threat landscape has changed drastically just over the last few months as some employees are mandated to work from home, and others are starting to go back in to the office. But throughout the changes, how you can ensure business continuity while keeping your end users protected?

    Join Proofpoint's experts Tim Choi, VP of Product Marketing, and Nathan Chessin, VP of Americas Technical Sales Engineering, as they discuss how you can keep users connected to the data and systems they need to do their job, without compromising how you protect your organization's most valuable assets.

    Speakers:
    Nathan Chessin, VP of Americas Technical Sales Engineering, Proofpoint
    Tim Choi, VP of Product Marketing at Proofpoint
  • Moving Target: How Threat Intel Drives Behavior Change Jul 30 2020 5:00 pm UTC 60 mins
    Mike Bailey, Sr. Product Marketing Manager
    Attackers are always looking for new targets in your organization. They’re using new lures and methods to coax your people into clicking on a phishing email, giving up their credentials, or even wiring money in a BEC scam. Rather than a one-size-fits-all security awareness program, we’ll show you how threat intel can inform a more focused, prescriptive approach to identifying user risk and changing behavior to not only avoid, but report these dangerous attacks.

    In this webinar, we’ll go over how to:

    - Use more realistic assessments and threat intel to identify user risk
    - Make behavior change more relevant with content based on the threat landscape
    - Empower users to report threats and leverage threat intel to identify and remove them
  • Email Fraud Defence: Why Email Fraud puts every Email-based Relationship at Risk Jul 30 2020 9:00 am UTC 60 mins
    Neil Hammet, Senior Product Evangelist, Email Fraud Defence & Chris Clarke, Email Fraud Defence
    Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email scams are also preventable.
    Learn to Authenticate Your Email with Confidence.

    Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains.

    - Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block email scams before they reach your employees, customers, and business partners.
    - Find out why 30% of the Fortune 1000 are fixing the number one vulnerability in email with Proofpoint Email Fraud Defense
    - Learn how to avoid the €2M loss that SS Lazio suffered as a result of this vulnerability
    Neil Hammet, our resident EMEA Email Fraud Evangelist will be running this session
  • Live Demo: People-Centric Cloud Security with Contextual & Risk-Aware DLP Jul 29 2020 5:00 pm UTC 45 mins
    Kris Ahlstrom, Managing Solutions Architect
    Adjusting to more work-from-home means evolving your security practices to reflect today’s reality - that people are at the center of everything. What you need is a security partner who builds solutions from the ground up to protect people and their data.

    Join us for a live demo of Proofpoint’s Cloud Access Security Broker (CASB) and other products from Proofpoint. We’ll show you how you can benefit from this approach including:

    - Correlation of Cloud Account Takeover with Email Threats
    - Tracking of post-login suspicious activities including data planting and exfiltration
    - Creation of contextual and risk-aware data security policies
    - Rising threat of third-party applications to your data and systems
  • The Impact of an Accelerated Remote Culture: How Regulated Firms Can Stay Ahead Jul 28 2020 3:00 pm UTC 37 mins
    Jasmine Wu, Director of Product Marketing - Proofpoint
    The majority of our interactions were face-to-face just two decades ago. Fast forward to today, the amount of time people spend on digital technologies and devices has fundamentally changed the way people interact, work, and communicate. For regulated firms and its governing bodies, the lasting impact this digital shift has created can no longer be ignored. In 2020, more than 80% of the world has gone remote. The amount of digital communication usage skyrocketed for every single industry with technologies including Slack, Zoom, Microsoft Teams and more. The digital world has already arrived, but the remote culture is here to stay. What does this mean for financial services and regulated industries, as well as the regulations that shape its foundation?

    During this session we will explore:

    − A timeline view of communications trends impacting regulated organizations

    − What are the observed challenges we can learn from along the way

    − What successful corporate strategies, technologies, and processes can help organizations stay ahead of an increasingly remote culture

    Speaker Bio: Jasmine Wu is the Director of Product Marketing at Proofpoint. She has more than 10 years of experience providing insight and thought leadership in the emerging communications and compliance space, including cloud collaboration technologies, digital risk protection, data governance and discovery.
  • Comment traiter les menaces internes grâce à l'approche centrée sur le personne Jul 23 2020 12:00 pm UTC 60 mins
    Gaëtan Gesret, Systems Engineer, Proofpoint France
    Les menaces internes sont à l'origine de vols de données à hauteur de trois millions d'enregistrements par jour en moyenne. Elles ont également été la cause de 57 % de toutes les compromissions de bases de données au cours de l'année écoulée (Verizon, 2019).

    Pourquoi sont-elles aussi fréquentes ? Toute personne disposant d'un accès légitime et approuvé aux systèmes et données d'une entreprise, qu'il s'agisse d'un collaborateur à temps plein, d'un prestataire externe à temps partiel ou d'un partenaire stratégique, peut devenir une menace interne. Comment les entreprises peuvent-elles y faire face ?

    Découvrez l’approche centrée sur les personnes proposée pat ObserveIT, une division de Proofpoint pour gérer les menaces internes.

    Au programme :

    • L'importance du contexte : comment une visibilité totale offre le contexte nécessaire pour comprendre et limiter les menaces internes, sans sacrifier la conformité et la confidentialité des utilisateurs
    • Types de menaces : les différents types de menaces internes et les mesures que vous pouvez prendre pour élaborer votre propre programme de gestion de ces menaces
    • Démonstration en direct : une démonstration en direct expliquant comment les activités contraires aux règles définies sont détectées et immédiatement analysées
  • Protecting Your Data Against the Insider Threat Risk Jul 23 2020 9:00 am UTC 60 mins
    Rob Bolton and Lee Duff Insider Threat Management specialists, Proofpoint
    As the workforce rapidly shifts to remote work, the complexity of protecting IP and sensitive data has grown exponentially. Old models of locking down the perimeter no longer apply. Instead, a modern, people-centric approach to Insider Threat Management can complement existing information protection programs, while providing greater visibility and context into both user behaviour and data movement.

    Join us in a 30-mins Live Talk with Proofpoint’s Rob Bolton and Lee Duff Insider Threat Management specialists as they discuss:

    - The types of insider threat profiles and how to address them. For example, organizations may not know how that more than 60% of insiders are negligent.
    - Why insider threats are unique and require context into both user and data activity. 
    - How to reduce response time by accelerating investigations. The longer the response times, the costlier an incident can get.
    - And more!
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access Jul 23 2020 6:30 am UTC 60 mins
    Etay Bogner, VP and GM Zero Trust Product and founder of Meta Networks
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Jul 21 2020 4:00 pm UTC 45 mins
    Jacob Kennedy, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • How Do We Adapt to Remote Work and Stay Compliant? Jul 21 2020 3:00 pm UTC 41 mins
    Amanda Cannata, Product Marketing Manager & Shannon Smith, Archiving Sale Specialist
    To many, the switch to a remote workforce is a huge change with a new set of obstacles. The existing programs and procedures that compliance teams have put in place to protect businesses and identify risk were not designed for a work-from-home workforce. Many are wondering: how do we adapt to remote work and stay compliant?

    In this webinar we discuss tips and best practices to help ensure your workforce is staying compliant. We will share:

    - Potential employee communication issues
    - How to make the most of your existing technology
    - Email template to communicate with employees
    - Resources to stay up to date on regulatory guidance
  • How Imposter Attacks Have Become an Imposing Threat to Healthcare Recorded: Jul 15 2020 57 mins
    Ryan Witt, Sr. Director of Healthcare & Brett Shaw, Sr. Product Marketing Manager at Proofpoint
    The 2019 HIMSS Cybersecurity Survey indicated that email is the initial point of compromise for healthcare cyber-attacks, with cybercriminals increasingly favoring Business Email Compromise (BEC) as a primary tactic. Because BEC emails do not carry malicious payload and are narrowly targeted, it’s difficult for health institutions to detect these attacks. In 2020, cybercriminals are even more focused on BEC attacks, with information related to COVID-19 being the primary lure.

    Join us for a deep analysis of BEC and how you can better protect your patients, healthcare workers, and business admins. In this session, we'll cover:

    - The cybersecurity challenges currently facing healthcare
    - How COVID-19 has become the primary focus of cybercriminal activities
    - Tips on how the industry can protect itself against these attacks
  • Live Panel cybersécurité avec Le Groupe Fives, Ilex International et Proofpoint Recorded: Jul 15 2020 53 mins
    Kelig Dugue, RSSI Groupe FIVES Loïc Guézo, Cybersecurity Strategy, Guillaume Guerrin Ilex
    Comment le groupe Fives a associé gestion des accès et sécurisation des données à ses applications cloud avec Ilex et Proofpoint ? - Français

    Kelig DUGUE, RSSI du Groupe FIVES, groupe international d’ingénierie industrielle comptant plus de 8 400 collaborateurs dans une trentaine de pays, sera l’invitée principale de ce webinar. Nous vous donnons rendez-vous le 9 juillet 2020 à 11h.

    Au cours de cette session, nos intervenants partageront :
    • Le retour d’expérience de Kelig Dugue, illustrant comment le groupe industriel contrôle, sécurise et surveille l’ensemble des accès de ses utilisateurs à son SI et leurs données exploitées dans le cloud ;
    • La démarche collaborative entre les équipes Proofpoint et Ilex International pour répondre aux besoins du Groupe FIVES en matière de protection de ses actifs.
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Awareness Training – Your best line of defence
  • Live at: May 26 2020 1:00 am
  • Presented by: Andrew Warren-Nicholls, Cyber Security Specialist, APJ
  • From:
Your email has been sent.
or close