Hi [[ session.user.profile.firstName ]]

Live Demo: Meta Networks – Implementing Zero Trust Network Access

The classic perimeter-based network security architecture that has been in place for 30 years. However, users and applications are no longer confined to the corporate network, and security organizations are challenged with protection in this new paradigm. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust and easier to manage. So how is that achieved?

Join our live demo on the Proofpoint Meta platform - a cloud native service that connects users to applications quickly and transparently regardless of where either resides. The platform leverages a Zero Trust Network Access model and provides flexible and granular policy controls in a cohesive, easy to manage environment. We'll demonstrate:

- How to improve security posture and simplify the user experience
- How to reduce your operational effort through our flexible and robust security controls
- How the platform is adaptive and can work with many use cases, with any application environment end user operating system
Recorded Jul 23 2020 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Etay Bogner, VP and GM Zero Trust Product and founder of Meta Networks
Presentation preview: Live Demo: Meta Networks – Implementing Zero Trust Network Access

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The 2020 State of CASB in Europe Sep 3 2020 1:30 pm UTC 60 mins
    James Johnson, CASB Expert & Jen Gough, Competitive Specialist, Proofpoint EMEA
    With the shift to work from home, cloud security is a bigger concern than ever. As the network perimeter is replaced by a user-defined security perimeter, enterprises need a people-focused approach to threat detection and data protection in the cloud. Organisations have adopted or plan to adopt Cloud Access Security Brokers (CASBs) to help them.
    Join Proofpoint experts as they discuss the findings of a newly conducted research among security professionals to determine the needs of enterprises from CASBs, and whether or not their expectations are being met.
    In this session, they will explore:
    - Where is CASB on the adoption curve?
    - How security professionals use CASB for visibility, compliance, data security, threat protection and access control
    - Effectiveness and next evolution of CASBs
  • Email Security: Protect Your No. 1 Threat Vector Aug 27 2020 1:30 pm UTC 60 mins
    Adrian Covich, Senior Director, Systems Engineering Proofpoint
    According to Gartner, “Business Email Compromise attacks increased by nearly 100% in 2019 and resulted in substantial financial losses in some cases.” Is your business prepared to defend against them?

    Join Adrian Covich of Proofpoint to discover how to keep pace within this rapidly moving threat landscape and best practice ways to protect your people and data from email attacks, the number one threat vector.

    In this session, you will learn:
    - The latest threat data and trends for email cyber attacks
    - How best to defend your people and data with Proofpoint Targeted Attack Protection
    - How to streamline your incident response process for emails

    Join us as we go deep and show you how to better protect against email, the number one threat vector for your business
  • Live Demo: Social Media Compliance Aug 25 2020 5:00 pm UTC 45 mins
    Shane Sauer, Sales Engineer at Proofpoint
    In financial services, health care, and other highly regulated industries, specific rules govern marketing communications and advertising practices when communicating with the public. So how can you better manage the process and stay compliant? Learn how to solve for complex social compliance pain points with ease using Proofpoint’s solution.

    Join this demo and listen to product expert Shane Sauer, who will demonstrate how Proofpoint:

    - Finds accounts associated with your firm, including rogue adviser accounts
    - Automates reviews and approvals of social profiles
    - Supervises social media activity in real time and notifies you of compliance violations
    - Removes non-compliant social media content
    - Provides detailed reporting and proof of compliance
  • New Realities of Insider Threats & Work from Home - Featuring Forrester Research Aug 25 2020 1:30 pm UTC 59 mins
    Proofpoint & Forrester Research experts & Mark Sutton, Sr VP & CISO of Bain Capital
    Organizations are not only managing a massive increase in the number of remote workers, but also remotely supporting a set of business-critical functions that traditionally are exclusively in-office activities. This shift in workforce dynamics brings a unique set of cybersecurity and insider threat considerations. As our guest, VP and Research Director Joseph Blankenship from Forrester Research, writes: the pandemic has created the "perfect conditions for insider threat ."

    Join Proofpoint and Forrester Research experts for a panel session as they discuss the new realities of a distributed workforce and how to better understand and respond to insider threat risk. In this webinar, they'll explore:

    - The new realities of how a distributed workforce accesses systems and data
    - The unique risks of insider threats and how to combat them
    - Why people-centric cybersecurity is the optimal approach to mitigating risk

    August 2020: Best of Proofpoint Summer Series.
    This webinar was originally run in June 2020, but is one of the most interesting discussions between a leading industry expert and an industry practitioner of the past quarter, so if you missed it, we highly recommend you give it a second look. Thanks in advance for your time, we hope you enjoy this webinar.
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Aug 20 2020 4:00 pm UTC 45 mins
    Jacob Kennedy, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Privacy and Security: Two Challenges, One Solution Aug 18 2020 5:00 pm UTC 60 mins
    Dr. Daniel Solove, CEO of Teach Privacy & Robert Shields, Sr. Product Marketing Manager at Proofpoint
    Data privacy has emerged as a critical challenge with 160 privacy laws worldwide. While privacy and security awareness have different components, both strive to change user behavior to reduce risk.

    Join us for this webinar as we explore the challenges of data security and privacy awareness and the efficiency of combining the efforts. We show you how an integrated approach can yield better results by:

    - Removing the redundancies of separate programs
    - Controlling training workload to avoid user burnout
    - Understand how to add privacy awareness to your security awareness program, with a ‘hub and spoke’ strategy
  • People-Centric Cybersecurity in Financial Services Aug 18 2020 1:30 pm UTC 54 mins
    Michael Osterman, President of Osterman Research & Sean Odowd, FinServ Director & John Checco, Resident CISO of Proofpoint
    The financial services industry is subject to enormous risk: it faces the highest rates of attack of any vertical market, it is the source of one-third of all data breaches, and it is vulnerable due to both the negligence and carelessness of employees and other insiders. Compounding the problem is that many financial professionals are now forced to work from home during the pandemic, and they’re using security solutions that often are not as robust as those used in their office environments. So how can you better protect your end-users in the new normal?

    Join Proofpoint and Osterman Research experts as they deep dive into the latest on a people-centric approach to cybersecurity in financial services. In this session, we’ll discuss:

    - The current threat landscape of the financial services industry
    - Best practices on defending against and recovering from cyber attacks and threats
    - Why cybersecurity transformation around people and culture is now more critical than ever

    August 2020: Best of Proofpoint Summer Series.
    This webinar was originally run in June 2020, but it is one of the most informative discussions from a leading industry expert. So if you missed it, we highly recommend you give it a second look. Thanks in advance for your time, we hope you enjoy this webinar.
  • Meine Domain gehört nur mir – Identitätsdiebstahl auf Unternehmensebene Aug 18 2020 11:30 am UTC 60 mins
    Isabel Hashi and Thomas Prax
    Es ist schwieriger als es aussieht, BEC-E-Mails zuverlässig als solche zu entlarven. Der Grund: BEC-Angriffe (Business Email Compromise, auch unter den Begriffen Chefmasche oder CEO-Betrug bekannt) nutzen das menschliche Verhalten aus. Die Anfrage stammt offenkundig von der richtigen Person und auch der Inhalt der Anfrage – etwa eine Banküberweisung vorzunehmen oder Auskunft zu vertraulichen Mitarbeiterdaten zu geben – gehört durchaus zum Tagesgeschäft des jeweiligen Mitarbeiters. Indem der Absender dieser Anfragen seine Identität fälscht, gelingt es ihm, den Ansprechpartner zu überlisten. Ein teurer Irrtum.

    In unserem Webinar erläutern wir, mit welchen Mitteln sich Unternehmen BEC-Angriffen entgegensetzen können. Eingegangen wird auf:
    - Transparenz erhalten über ein- und ausgehende Bedrohungen, die sich der Identität Ihres Unternehmens bedienen
    - E-Mail Authentifizierung inklusive des DMARC-Standards implementieren
    - Abgrenzung Business Email Compromise (BEC) und Email Account Compromise (EAC)
  • Capturing and Managing Communications Data in the Modern Enterprise Aug 13 2020 5:00 pm UTC 60 mins
    Amanda Anderson, Product Marketing Manager & Dave Ely, Dir. of Product Management
    Employees depend on digital communication tools to collaborate more than ever before. Chat and collaboration apps, text messaging, and social media have made it possible for employees to communicate, but they can also put the firm at risk. As they adopt new communication tools, firms must ensure that they continue to comply with regulations and corporate policies.

    In this webinar, we will take a deep dive into the challenges that firms face with capturing and managing content and strategies for staying compliant.

    You’ll learn:

    - How the business communications landscape is evolving
    - Key considerations for capturing and managing your content
    - How Proofpoint Content Capture can help
  • Archiving Innovations: Meeting today’s Compliance and e-discovery needs Aug 13 2020 1:00 pm UTC 60 mins
    Michael McGrath, Senior Director, Compliance and Digital Risk, Proofpoint Jen Gough, Competitive Specialist, Proofpoint
    Economics, social and regulatory pressures have fundamentally changed the demands on archiving solutions. This creates new challenges and opportunities for the enterprise – from need of supervision to help ensure regulatory compliance and provide proof of compliance, to broader application of the technology. For instance, the monitoring of business digital communications for opportunities for training or targeted actions can help improve employee performance, reduce policy violations, and much more.
    Welcome to the next wave in Archiving Compliance technologies.
    In this Live Webinar, we’ll discuss how archiving has evolved to address today’s information management challenges and unveil how you can improve information governance, compliance and financial position by:
    Streamlined e-discovery to increase efficiency and reduce costs.
    Refined insights expand visibility for mitigating risks.
    Enhanced regulatory compliance supervision to improve review accuracy across email, social, and enterprise collaboration data.
    As an added bonus, we’ll wrap up the webinar with a live demo of Proofpoint Enterprise Archive, including key features in E-Discovery Analytics and Intelligent Supervision.
  • The Maturing of Business Email & Account Compromise in Financial Services Aug 12 2020 5:00 pm UTC 60 mins
    John Checco, Resident CISO & Sean Odowd, FinServ Solutions Director at Proofpoint
    Historically, business email compromise (BEC) has focused on spoofing a sender to convince the recipient to click on a URL or download a malware payload. With the progression of both back-end technologies, as well as front-end user security awareness training, there has been a significant drop in BEC-initiated compromises. But the growing prevalence of cloud-based office suites – and their misconfigurations – has allowed bad actors to takeover access to legitimate email and use it to bypass most existing detection techniques. So how can you better protect your user?

    Join our Proofpoint experts in this webinar as they discuss:

    - The factors that make so-called email or enterprise account compromise (EAC) a hard problem to solve
    - The areas where enterprises are most vulnerable based on recent use cases
    - How a people-centric approach will better secure your end users
  • How to Implement Risk Mitigation in Canada Recorded: Aug 11 2020 61 mins
    Proofpoint Archive & Compliance Experts
    With the shift to remote work and the potential insider, compliance and conduct risks that it poses, Canadian businesses are becoming aware of the need to implement proactive controls to detect problematic employee behavior. Risk Mitigation Programs may include the monitoring activity on websites, file shares, and communication channels, but the key is to balance privacy considerations with a risk-based approach.

    Join us Tuesday, August 11 and discover the latest approach to protect your organization and learn:

    - What a true holistic Risk Mitigation program looks like
    - Why a proactive, Risk Mitigation program is critical for your organization
    - How Proofpoint can help you implement your overall Risk Mitigation program
  • LIVE TALKS: Securing Remote Work Through Cloud Security During Shelter-In-Place Recorded: Aug 11 2020 31 mins
    Ryan Kalember, EVP Cybersecurity Strategy & Roie Cohen-Dowek, Security Research Director of Proofpoint
    With the shift to remote work, the need to detect and respond to cloud security risks is more critical than ever. So how you can ensure business continuity while keeping your end users protected?

    Join our LIVE TALKS video chat with Ryan Kalember, EVP of Cybersecurity Strategy, and Roie Cohen-duwek, Security Research Director, of Proofpoint as they share:

    - How attackers both target and leverage your cloud apps through old and new vectors
    - The intersection of cloud threats and business email compromise
    - How organizations can detect and respond to threats to cloud accounts and data
  • PANEL: Benchmarks & KPIs You Need to Know for Security Awareness Training Recorded: Aug 11 2020 64 mins
    Shelly Epps, Alexandra Panaretos, and Moderator: Paul Down from various companies
    The threat landscape is constantly evolving, and people continue to be the number one target for attackers. Having a comprehensive, data-driven security awareness program in place is more important than ever to reduce your people-centric security risk and build a strong last line of defense.

    Join us as we hold a live panel on how today’s enterprises are employing new strategies and measuring success with their security awareness programs. We’ll answer questions like – why is there more variance with user reporting rates than click rates? What percentage of users can you expect to use a VPN or password manager? With this webinar you'll get a better understanding of:

    - Today’s security awareness landscape and pressing topics for user
    - Best practices companies are employing today
    - KPIs companies are measuring for success
    - Key benchmarks you can use to understand program maturity

    August 2020: Best of Proofpoint Summer Series.
    This webinar was originally run in May 2020, but is one of the most entertaining and informative panel discussions of the past quarter, so if you missed it, we highlight recommend you give it a second look. Thanks in advance for your time, we hope you enjoy this webinar.

    *This session is eligible for one CPE credit with ISC(2). To claim your credit, please submit our online form here: https://go.proofpoint.com/webinars-submit-cpe-credit
  • Live Demo Protect Your Data. Reduce Insider Threat Risk. Recorded: Aug 6 2020 57 mins
    Shlomi Saki, Director & Damian Skeeles, Principle Sales Engineer, Proofpoint ANZ
    Insider threats are quickly becoming one of the biggest cybersecurity threats that organizations face today. According to the 2020 DBIR Report, 30% of all data breaches breaches originated with insiders in the past year.
    Insider threats are so common because anyone with legitimate, trusted access to an organization’s systems and data – whether it’s careless users, disgruntled employees or compromised accounts – can become an insider threat.
    Join Damian Skeeles and Shlomi Shaki from Proofpoint Insider Threat Management to discover how easy it can be to protect your data and reduce the risk of insider threats.
    In this webinar you will learn:
    • How to better understand and respond to insider-caused data breaches
    • What it takes to effectively prevent data loss in the modern enterprise
    • Methodologies to reduce investigation times by 60-90%
  • LIVE TALKS: Threat Intelligence & Security Awareness for The New Normal Recorded: Aug 4 2020 32 mins
    Sherrod DeGrippo, Sr. Director of Threat Research & Detection and Robert Shields, Sr. Product Marketing Manager at Proofpoint
    Threat intelligence helps prevent attacks and reduce risk by helping you understand the historical context of where these threats originated, who is behind them, when have they attacked, what methods they used, and what they're after. Coupling that intelligence with security awareness training creates a strong counter-measure to people-centric attacks.

    Join us for our live video chat as our experts explore how organizations can harness threat intelligence in The New Normal to:

    - Better understand who is targeted in your organization especially during shelter-in-place
    - What tactics attackers are using to manipulate users into clicking malicious links and attachments
    - How you can leverage threat intelligence to adjust security awareness content and schedules to meet new threats
  • Insider Threats and Hunting the Enemy Within Recorded: Aug 3 2020 59 mins
    Shawn Fleury (Crypsis Group), Gabe Gumbs (Spirion), Sai Chavali (Proofpoint), Lisa Plaggemier (MediaPRO)
    Insider threats - whether they are current or former employees, contractors or partners with access to company systems or data who use that access maliciously or unintentionally - account for 60 percent of cyber attacks. 
    Insider threats are difficult to detect, and in many cases they can go unnoticed for months or years. In fact, detecting an internal threat is one of most difficult and ungrateful tasks for security teams in the organization. 

    Join this panel of security experts as they discuss insider threat hunting techniques and recommendations for safeguarding the enterprise against internal and external threats.

    - Why are insider threats so dangerous
    - Technical and human factor challenges 
    - How to detect and prevent malicious insider activity
    - How to keep the biggest threats to your organization at bay

    Speakers:
    Shawn Fleury, Director of Risk Management, The Crypsis Group
    Gabe Gumbs, Chief Innovation Officer, Spirion
    Sai Chavali, Sr Product Marketing Manager, Proofpoint Insider Threat Management
    Lisa Plaggemier, Chief Strategy Officer, MediaPRO
  • Securing Data & Access for Your Growing Remote Workforce Recorded: Aug 3 2020 31 mins
    Nathan Chessin & Tim Choi (Proofpoint)
    The 2020 cyber threat landscape has changed drastically just over the last few months as some employees are mandated to work from home, and others are starting to go back in to the office. But throughout the changes, how you can ensure business continuity while keeping your end users protected?

    Join Proofpoint's experts Tim Choi, VP of Product Marketing, and Nathan Chessin, VP of Americas Technical Sales Engineering, as they discuss how you can keep users connected to the data and systems they need to do their job, without compromising how you protect your organization's most valuable assets.

    Speakers:
    Nathan Chessin, VP of Americas Technical Sales Engineering, Proofpoint
    Tim Choi, VP of Product Marketing at Proofpoint
  • Moving Target: How Threat Intel Drives Behavior Change Recorded: Jul 30 2020 32 mins
    Mike Bailey, Sr. Product Marketing Manager
    Attackers are always looking for new targets in your organization. They’re using new lures and methods to coax your people into clicking on a phishing email, giving up their credentials, or even wiring money in a BEC scam. Rather than a one-size-fits-all security awareness program, we’ll show you how threat intel can inform a more focused, prescriptive approach to identifying user risk and changing behavior to not only avoid, but report these dangerous attacks.

    In this webinar, we’ll go over how to:

    - Use more realistic assessments and threat intel to identify user risk
    - Make behavior change more relevant with content based on the threat landscape
    - Empower users to report threats and leverage threat intel to identify and remove them
  • Email Fraud Defence: Why Email Fraud puts every Email-based Relationship at Risk Recorded: Jul 30 2020 48 mins
    Neil Hammet, Senior Product Evangelist, Email Fraud Defence & Chris Clarke, Email Fraud Defence
    Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email scams are also preventable.
    Learn to Authenticate Your Email with Confidence.

    Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains.

    - Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block email scams before they reach your employees, customers, and business partners.
    - Find out why 30% of the Fortune 1000 are fixing the number one vulnerability in email with Proofpoint Email Fraud Defense
    - Learn how to avoid the €2M loss that SS Lazio suffered as a result of this vulnerability
    Neil Hammet, our resident EMEA Email Fraud Evangelist will be running this session
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live Demo: Meta Networks – Implementing Zero Trust Network Access
  • Live at: Jul 23 2020 6:30 am
  • Presented by: Etay Bogner, VP and GM Zero Trust Product and founder of Meta Networks
  • From:
Your email has been sent.
or close