Hi [[ session.user.profile.firstName ]]

Email Security: Protecting your #1 Threat Vector - APAC

In 2020, what is a cyber criminal’s weapon of choice? As attacks against your organisational firewalls fade away, what’s next? Leading research from the FBI and Forrester Wave shows that email is today's number one threat vector and the threat email poses changes and evolves more rapidly than ever before. If you work in Information Security, you already know that you and your team have a hard time keeping up with the volume of attacks coming from email.
Join Omer Lhav of Proofpoint to discover how to keep pace within this rapidly moving threat landscape and best practice ways to protect your people and data from email attacks, and in particular you will learn:
- The latest threat data and trends for email cyber attacks- How best to defend your people and data with Proofpoint Targeted Attack Protection- How to streamline your incident response process for emails
Join us as we go deep and show you how to better protect against email, the number one threat vector for your business
Recorded May 21 2020 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Omer Lahav Principal Sales Engineer, Proofpoint APAC
Presentation preview: Email Security: Protecting your #1 Threat Vector - APAC

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Demo: Advanced People-Centric Cybersecurity for Cloud Applications Sep 30 2020 4:00 pm UTC 45 mins
    Craig Morell, Sr. Sales Engineer at Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric cybersecurity journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people and defend your data as your organization works with O365, G Suite, and other cloud applications
    - Leverage Proofpoint’s CASB solution to gain a centralized view of your cloud environment
    - Block threats associated with compromised accounts, risky third-party apps, and the misuse of valuable data
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Sep 22 2020 4:00 pm UTC 45 mins
    David Kleppick, Enterprise Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Ramping Up People-Centric Security for BEC & EAC Sep 16 2020 4:00 pm UTC 45 mins
    Craig Morell, Sr. Sales Engineer of Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric security journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people from impostor email attacks, like business email compromise (BEC)
    - Investigate and respond to the risks of email account compromise (EAC), including internal email threats sent from compromised accounts
    - Prevent risks associated with personal webmail and risky websites sent via corporate email
  • Live Demo: Foundations of People-Centric Cybersecurity for Email Sep 2 2020 4:00 pm UTC 45 mins
    Dustin Anderson, Senior Sales Engineer, Proofpoint
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric security journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people from the #1 threat vector that attackers use today: email
    - Gain visibility into which people are being attacked, how they’re being attacked, and whether they’re compromised
    - Build a robust security awareness training program
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Aug 20 2020 4:00 pm UTC 45 mins
    Jacob Kennedy, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: A People-Centric Approach to Insider Threat Management Aug 6 2020 2:30 am UTC 60 mins
    Damian Skeeles, Principle Sales Engineer, ANZ
    Accordingly to the 2020 DBIR report more than 30% of all data breaches are the result of insider threats. As more companies look to successfully transition to the cloud, traditional ways of protecting data and intellectual property aren’t enough.

    Context is key when incidents occur to understand intent from the user-perspective and enable a streamlined investigative process. So how is this achieved?

    Join this live demo as we discuss:
    • Methodologies that reduce investigation times by 60-90%
    • The value behind correlating user activity + data movement in insider related incidents
    • Communication techniques to measure risk when involving other business stakeholders
  • Email fraud puts every email-based relationship at risk. Jul 30 2020 9:00 am UTC 60 mins
    Neil Hammet, Senior Product Evangelist, Email Fraud Defence & Chris Clarke, Email Fraud Defence
    Authenticate Your Email with Confidence
    Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email scams are also preventable.

    Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains.

    Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block email scams before they reach your employees, customers, and business partners.
    - Find out why 30% of the Fortune 1000 are fixing the number one vulnerability in email with Proofpoint Email Fraud Defense
    - Learn how to avoid the €2M loss that SS Lazio suffered as a result of this vulnerability
    Neil Hammet, our resident EMEA Email Fraud Evangelist will be running this session
  • Comment traiter les menaces internes grâce à l'approche centrée sur le personne Jul 23 2020 12:00 pm UTC 60 mins
    Gaëtan Gesret, Systems Engineer, Proofpoint France
    Les menaces internes sont à l'origine de vols de données à hauteur de trois millions d'enregistrements par jour en moyenne. Elles ont également été la cause de 57 % de toutes les compromissions de bases de données au cours de l'année écoulée (Verizon, 2019).

    Pourquoi sont-elles aussi fréquentes ? Toute personne disposant d'un accès légitime et approuvé aux systèmes et données d'une entreprise, qu'il s'agisse d'un collaborateur à temps plein, d'un prestataire externe à temps partiel ou d'un partenaire stratégique, peut devenir une menace interne. Comment les entreprises peuvent-elles y faire face ?

    Découvrez l’approche centrée sur les personnes proposée pat ObserveIT, une division de Proofpoint pour gérer les menaces internes.

    Au programme :

    • L'importance du contexte : comment une visibilité totale offre le contexte nécessaire pour comprendre et limiter les menaces internes, sans sacrifier la conformité et la confidentialité des utilisateurs
    • Types de menaces : les différents types de menaces internes et les mesures que vous pouvez prendre pour élaborer votre propre programme de gestion de ces menaces
    • Démonstration en direct : une démonstration en direct expliquant comment les activités contraires aux règles définies sont détectées et immédiatement analysées
  • Protecting Your Data Against the Insider Threat Risk Jul 23 2020 9:00 am UTC 60 mins
    Rob Bolton and Lee Duff Insider Threat Management specialists, Proofpoint
    As the workforce rapidly shifts to remote work, the complexity of protecting IP and sensitive data has grown exponentially. Old models of locking down the perimeter no longer apply. Instead, a modern, people-centric approach to Insider Threat Management can complement existing information protection programs, while providing greater visibility and context into both user behaviour and data movement.

    Join us in a 30-mins Live Talk with Proofpoint’s Rob Bolton and Lee Duff Insider Threat Management specialists as they discuss:

    - The types of insider threat profiles and how to address them. For example, organizations may not know how that more than 60% of insiders are negligent.
    - Why insider threats are unique and require context into both user and data activity. 
    - How to reduce response time by accelerating investigations. The longer the response times, the costlier an incident can get.
    - And more!
  • Live Demo: Meta Networks – Implementing Zero Trust Network Access Jul 23 2020 6:30 am UTC 60 mins
    Etay Bogner, VP and GM Zero Trust Product and founder of Meta Networks
    The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

    Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

    - How to improve security posture and simplify the user experience
    - How to reduce your operational effort through our flexible and robust security controls
    - How the platform is adaptive and can work with many use cases, with any application environment end user operating system
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Jul 21 2020 4:00 pm UTC 45 mins
    Jacob Kennedy, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • How Imposter Attacks Have Become an Imposing Threat to Healthcare Jul 15 2020 5:00 pm UTC 60 mins
    Ryan Witt, Sr. Director of Healthcare & Cheryl Tang, Dir. of Product Marketing at Proofpoint
    The 2019 HIMSS Cybersecurity Survey indicated that email is the initial point of compromise for healthcare cyber-attacks, with cybercriminals increasingly favoring Business Email Compromise (BEC) as a primary tactic. Because BEC emails do not carry malicious payload and are narrowly targeted, it’s difficult for health institutions to detect these attacks. In 2020, cybercriminals are even more focused on BEC attacks, with information related to COVID-19 being the primary lure.

    Join us for a deep analysis of BEC and how you can better protect your patients, healthcare workers, and business admins. In this session, we'll cover:

    - The cybersecurity challenges currently facing healthcare
    - How COVID-19 has become the primary focus of cybercriminal activities
    - Tips on how the industry can protect itself against these attacks
  • Live Panel cybersécurité avec Le Groupe Fives, Ilex International et Proofpoint Jul 15 2020 9:00 am UTC 60 mins
    Kelig Dugue, RSSI Groupe FIVES Loïc Guézo, Cybersecurity Strategy, Guillaume Guerrin Ilex
    Comment le groupe Fives a associé gestion des accès et sécurisation des données à ses applications cloud avec Ilex et Proofpoint ? - Français

    Kelig DUGUE, RSSI du Groupe FIVES, groupe international d’ingénierie industrielle comptant plus de 8 400 collaborateurs dans une trentaine de pays, sera l’invitée principale de ce webinar. Nous vous donnons rendez-vous le 9 juillet 2020 à 11h.

    Au cours de cette session, nos intervenants partageront :
    • Le retour d’expérience de Kelig Dugue, illustrant comment le groupe industriel contrôle, sécurise et surveille l’ensemble des accès de ses utilisateurs à son SI et leurs données exploitées dans le cloud ;
    • La démarche collaborative entre les équipes Proofpoint et Ilex International pour répondre aux besoins du Groupe FIVES en matière de protection de ses actifs.
  • A Modern People-Centric Approach to Managing the Risk of Insider Threats Jul 9 2020 5:00 pm UTC 60 mins
    Josh Epstein, VP of Marketing for ITM & Nirav Shah, Dir. of Product Management at Proofpoint ITM
    With an increasingly distributed workforce, insider threats are on the rise. In fact, the Verizon DBIR 2020 found 30% of all data breaches are insider-caused. It’s time to change the way organizations address insider threats.

    There is a significant need in the market for a modern, purpose-built Insider Threat Management solution that puts people at the heart of security strategy. It’s never been more important for ITM solutions to deliver fast time to value, reduce mean time to detect and mean time to resolve, and speed up investigations. Moreover, the ubiquity of the cloud and SaaS tools across the modern organization means that any ITM program must be scalable and extensible.

    In this webinar, we’ll share actionable strategies to manage insider threat risk, including the value of a technology-enabled ITM program. We’ll also demonstrate the new and improved ObserveIT Insider Threat Management Platform.

    In this session, you’ll learn:

    - Why people-centric security is the way forward in our “new normal” work world
    - What it takes to build a successful and sustainable Insider Threat Management program
    - The power of correlation and context when it comes to reducing Insider Threat risk
  • Educating Your People Against Cybercriminals Latest Tactics Jul 9 2020 1:00 pm UTC 60 mins
    Paul Down, Director, Proofpoint EMEA & Matt Cooke, Cybersecurity Specialist, Proofpoint EMEA
    Cybercriminals continue to leverage uncertainty and fear to launch malicious campaigns with one aim in mind – to get your people to click. And, while remote working and collaboration via digital platforms has become the new normal for many of us, criminal motivations haven't shifted quite so dramatically. It's their opportunity and attack surface that has just increased.

    Join us in a 30-mins Live Talk with Paul Down, Senior Security Awareness Specialist and Matt Cooke International Cybersecurity Specialist at Proofpoint as they discuss:

    - How to take security awareness beyond just threats and phishing and use it to help your people adapt to the new normal, securely
    - How we to educate so people understand their role in protecting not only your organisations data, but also personal and family data against those threats
    - How we can use security awareness training metrics to better understand and respond to organisational risk.

    At the end of this session we’ll be providing you the opportunity to take our free People Risk Assessment and see how you compare with other companies in your industry.
  • Staying Ahead Of Cybercriminals With The Latest From The Threat Landscape Recorded: Jul 2 2020 36 mins
    Richard Davis, International Cybersecurity Specialist & Davide Canali, Threat Analyst
    Discover how in 2020 Coronavirus-related email lures became the greatest collection of attack types united by a single theme that the Proofpoint Threat Research and Detection team had seen in years, if not ever.

    Register below and join Davide Canali, Threat Analyst and Richard Davis, International Cybersecurity Strategist, in a 30-mins Live Talk, as they share:

    - The current state and rapid evolution of COVID-themed phishing campaigns
    - Key defence mechanisms to reduce your organization's risk
    - Awareness and training measures you can take to keep your users from falling victim
  • Gérer l’impact d’une pandémie sur l’entreprise en qualité de RSSI - Français Recorded: Jun 30 2020 36 mins
    Fabrice Bru, RSSI, Administrateur du CESIN, Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint
    Les cybercriminels continuent d'exploiter nos craintes et nos incertitudes au moyen de campagnes malveillantes dont l'unique objectif est de nous inciter à cliquer sur des liens dangereux pour notre sécurité.

    Ces attaques visent directement les personnes et recourent à des techniques d'ingénierie sociale. De plus, la situation exceptionnelle que nous vivons aujourd'hui nous oblige à nous adapter rapidement et à adopter massivement le télétravail, une transition qui expose nos utilisateurs à davantage d'attaques, du phishing au piratage de la messagerie en entreprise (BEC, Business Email Compromise).

    Et tandis que les cybercriminels continuent de prendre pour cible nos collaborateurs, le rôle des RSSI évolue de façon inédite. Comment les RSSI et les équipes de sécurité peuvent-ils s'adapter pour mieux protéger l'entreprise en cette année difficile ?

    Fabrice Bru, RSSI, Administrateur du Club des Experts de la Sécurité de l'Information et du Numérique (CESIN), et Loïc Guézo, Senior Director, Cybersecurity Strategy de Proofpoint, font le point avec vous lors d'une intervention Live Talk de 30 minutes.

    Au programme :

    L'impact de la pandémie et l'évolution des campagnes de phishing exploitant le thème du COVID-19
    Partage de l'expérience d'un groupe de RSSI qui ont collaboré pour adapter leurs programmes de sécurité afin de garantir une utilisation sûre et productive de l'environnement numérique, malgré la pandémie
  • Navigating Through a Pandemic as a CISO, and Beyond Recorded: Jun 30 2020 29 mins
    Fabrice Bru, RSSI, Administrateur du CESIN, Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint
    Cybercriminals continue to leverage uncertainty and fear to launch malicious campaigns with one aim in mind – to get your people to click. These attacks are targeted at people and require social engineering to succeed. What’s more, the disruption we are all facing today has forced us all to quickly adapt, move to a WFH environment and potentially exposing our users to increased attacks – from phishing to business email compromise attacks.

    While the cybercriminals remain busy in their pursuit of exploiting our employees, the CISOs role has been pushed to new limits. So how must CISOs and their security teams evolve to better protect your organisation this year?

    Join Fabrice BRU, CISO, Administrator of ‘Club des Experts de la Sécurité de l’Information et du Numérique’ (CESIN) and Loïc Guézo, Senior Director, Cybersecurity at Proofpoint as they share real life experiences on how this community of CISOs have joined together to update their security programmes to ensure we thrive in this digital-first world, despite the pandemic.
  • Live Demo- How to Combat Email Account Compromise (EAC) with Proofpoint Solution Recorded: Jun 25 2020 46 mins
    Sara Pan, Sr. Product Marketing Manager & Bo Mendenhall, Cloud Security Solutions Architect of Proofpoint
    Email Account Compromise (EAC) is often associated with business email compromise (BEC) because compromised email accounts are used in a growing number of BEC-style scams. Attackers use various tactics, such as password spay, phishing, or malware, to compromise an email account. And once they’re in, they can phish internally or launch another BEC attack. So how can you better protect your company and end users?

    Join this live demo webinar and learn more about the following:

    - How does EAC work
    - Real-life examples of EAC attempts
    - How does Proofpoint detect and stop EAC attempt
  • Applicazioni SaaS: conosci i loro rischi e come mitigarli? Recorded: Jun 25 2020 57 mins
    Antonio Ierano, Luca Maiocchi, Massimo Angiulli, Cybersecurity Specialists, Proofpoint Itallia
    Le aziende si sono recentemente dovute adattare ad una improvvisa e forte necessità di favorire il lavoro da remoto, garantendo in questo modo la continuità del business ma decentralizzando alcuni aspetti di sicurezza che diventano sempre più complessi da controllare al di fuori del perimetro aziendale.

    Tra questi, sicuramente assume un ruolo fondamentale quello dell’accesso alle applicazioni SaaS, che deve garantire un adeguato livello di sicurezza compatibilmente con il contesto dell’utente ed i dispositivi utilizzati per fruirne.

    Partecipa scoprire le caratteristiche delle soluzioni di protezione SaaS offerte da Proofpoint. In questo Webinar parleremo di:
    • Applicazioni SaaS e la loro esposizione al rischio
    • Offering delle soluzioni Proofpoint: TSD, CAD, CASB
    • Architettura e caratteristiche della soluzione Cloud App Security Broker
    • Adaptive Access Control, un modo nuovo e a bassissimo impatto per la protezione dinamica delle applicazioni SaaS
    • Demo della piattaforma e dei casi d’uso
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Email Security: Protecting your #1 Threat Vector - APAC
  • Live at: May 21 2020 2:30 am
  • Presented by: Omer Lahav Principal Sales Engineer, Proofpoint APAC
  • From:
Your email has been sent.
or close