Hi [[ session.user.profile.firstName ]]

The 2020 State of CASB in Europe

With the shift to work from home, cloud security is a bigger concern than ever. As the network perimeter is replaced by a user-defined security perimeter, enterprises need a people-focused approach to threat detection and data protection in the cloud. Organisations have adopted or plan to adopt Cloud Access Security Brokers (CASBs) to help them.
Join Proofpoint experts as they discuss the findings of a newly conducted research among security professionals to determine the needs of enterprises from CASBs, and whether or not their expectations are being met.
In this session, they will explore:
- Where is CASB on the adoption curve?
- How security professionals use CASB for visibility, compliance, data security, threat protection and access control
- Effectiveness and next evolution of CASBs
Recorded Sep 3 2020 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Johnson, CASB Expert & Jen Gough, Competitive Specialist, Proofpoint EMEA
Presentation preview: The 2020 State of CASB in Europe

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Was Guy Fawkes the Biggest and Boldest Insider Threat ever? Nov 5 2020 2:00 pm UTC 60 mins
    Rob Bolton, Sr Director & Lee Duff, ITM Engineer from Proofpoint Insider Threat Management
    Insider threats come in all shapes and sizes and affect organisations across all industries and geographies. Understanding the motives behind them is key to defence. One of the best ways to do this is to study some of the bold, headline-generating insider threats that have taken place recently, like the big Twitter debacle of July 2020. This is just one example of what has become a very common problem.

    Join us for a live talk with Rob Bolton, Proofpoint’s Insider Threat Management Senior Expert as we reveal the stories behind the biggest and boldest top 10 insider threats of 2019 and 2020 to date.

    You will learn:

    ● What happened in each incident?
    ● Practical security tips inspired by these real-world breaches
    ● How to mitigate your own insider risk
  • Zero-Trust | The Next Generation in Secure Enterprise Application Access Nov 3 2020 2:00 pm UTC 45 mins
    Mark Edge & Ethan Davidi
    The classic perimeter-based network security architecture has been in place for 30 years. So it comes with no surprise that Gartner reports that by 2023, 60% of enterprises will phase out most of their remote access virtual private networks (VPNs) in favour of Zero-Trust Network Access*.

    In today’s new (work) reality, users and applications are no longer confined to the corporate network, and security organisations are challenged with protection and visibility like never before. This highly dynamic and sometimes unpredictable delivery model needs a new approach to network and application access that is more robust, easier to manage and provides end-to-end visibility no matter where it’s deployed.

    Join us as we explore why in this new (work) reality, enterprises need a better alternative for secure remote application access. In this session, we will specifically dive in to:

    - Benefits of a cloud-delivered secure remote access with simple deployment and central policy management
    - How to leverage zero-trust security with adaptive controls and micro-segmented application access to isolate your network from threats
    - How to accelerate cloud migration with user-cloud access, multi-cloud connectivity and hybrid-cloud connectivity
    - Why an always-on, zero-trust security architecture system can provide protection beyond the traditional perimeter.

    *Source: Gartner Market Guide to Zero-Trust Network Access.
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training Oct 29 2020 11:00 am UTC 44 mins
    Jacob Kennedy, Account Executive at Proofpoint
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click

    This is a replay of this exceptional demonstration by Jacob Kennedy, scheduled to suit an EMEA audience. We recommend this to you.
  • Zero-Trust Security Webinar Sicherer Fernzugriff für jede Cloud-Anwendung Oct 29 2020 10:30 am UTC 60 mins
    Oliver Adam, Senior Systems Engineer
    Menschen sind der neue Perimeter der Cybersicherheit. Nicht nur die eigenen Mitarbeiter, all diejenigen, die Zugang zu sensiblen Daten und kritischen Systemen haben, können zu einer sicherheitsrelevanten Bedrohung werden. Das schließt Partner ebenso ein wie Agenturen und andere Dritte. Der Schutz von Menschen und Ressourcen außerhalb des traditionellen Perimeters ist in der heutigen Cloud-Ära wichtiger als je zuvor.

    Nehmen Sie teil am Webinar mit Oliver Adam, Senior Systems Engineer bei der Proofpoint GmbH. Unter anderem erwarten Sie folgende Themen:
    - Mittels Zero Trust Netzwerkzugriff die Sicherheitsrisiken effektiv senken, da der Zugang lediglich für auf bestimmte Anwendungen gewährt wird
    - Durch adaptive Kontrollen und mikrosegmentierten Anwendungszugriff das Netzwerk von Bedrohungen isolieren
    - Über einen software-definierten Perimeter, der Anwender und Daten sowohl innerhalb als auch außerhalb des Unternehmens schützt, die Digitalisierung des Unternehmens vorantreiben

    Registrieren Sie sich noch heute, um wertvolle Einblicke und Best Practices für den Schutz Ihrer Mitarbeiter und Ressourcen über den traditionellen Perimeter hinaus zu erhalten.
  • Driving Real Behaviour Change: Build a Security Awareness Program that Works Oct 22 2020 1:30 pm UTC 60 mins
    Paul Down, Director & Matt Cooke, Cybersecurity Specialist, Proofpoint EMEA
    When it comes to modern Cybersecurity – ultimately your users are your last line of defence. So you need to arm them with both knowledge and practice to mould dynamic, alert guardians of both your organisation and your data. The key to your success is engaging, entertaining - and crucially - topical security awareness training.

    So where to start, or how to renew your program? Are you one of the 80% of organisations who allocate two hours or less per year for security awareness, how useful do you judge this small amount of user training to effect behaviour change?

    Join our Security Awareness Training experts as we review valuable strategies on how to create and sustain an impactful cybersecurity awareness education program. Plus we delve deep into thought-leadership on the following questions:

    - How do I ensure my users embrace the training? Who are the key influencers internally?
    - What is the minimum – and maximum – levels of training shown to have been successful?
    - How do I motivate and reward my last line defenders?
    - What reporting and measures are the most pertinent to the IT team and alternatively to the C-suite?
  • Insider Risk in Financial Services: The $14.5 Million Problem Oct 22 2020 9:30 am UTC 60 mins
    Rob Bolton and Lee Duff Insider Threat Management specialists, Proofpoint
    Financial services companies face some of the worst outcomes from Insider Threats. A recent benchmark study found that the Financial services sector experienced the highest average yearly cost. Containing insider threats costs the industry $14.5 million annually. That is a 20.3% increase from 2018.
     
    Insider incidents at financial services companies can lead to: fraud, financial losses, data leaks, regulatory fines and more. The root cause may be a sloppy user or third-party contractor, an angry employee or a stolen login. No matter the cause, companies need visibility into insider threats. People-centric security helps financial companies better manage risk.
     
    Join our Insider threat experts and your industry peers in this Live Talk where we’ll explore the unique risks of insider threats and how to combat them. In this session, we’ll specifically dive in to:

    - The three main insider threat profiles and how to address each.
    - Why insider threats are unique and require more context than other threats.
    - How to reduce response time and costs by speeding up investigations.
     
    Register today to learn more about how insider-led breaches affect financial services and how to mitigate the risk.
  • CASB 2020 – Wie ist es um die Sicherheit von Cloud-Anwendungen bestellt? Oct 22 2020 9:00 am UTC 60 mins
    Markus Pauly, Cybersecurity Specialist
    Je mehr Mitarbeiter im Home Office arbeiten, umso mehr sorgen sich Sicherheitsverantwortliche um die Sicherheit der in Cloud-Apps gespeicherten sensiblen Informationen. Und je mehr ein durch das Netzwerk definierter Perimeter der Vergangenheit angehört und die einzelnen Mitarbeiter die tatsächlichen Grenzen des Unternehmens bestimmen, umso mehr benötigen Unternehmen einen personenorienteren (People-Centric) Ansatz, wenn es um die Erkennung von Bedrohungen und den Datenschutz in der Cloud geht. Cloud Access Security Broker (CASB) adressieren dieses Problem.

    Nehmen Sie am 22. Oktober am Webinar mit Markus Pauly, dem ausgewiesenen Experten bei Proofpoint für das Thema Cloud-Sicherheit und CASB, teil und diskutieren Sie mit ihm über die Erkenntnisse einer kürzlich durchgeführten Studie hinsichtlich des CASB-Einsatzes in Unternehmen. Folgende Fragen werden behandelt:

    - Wie ist es um die Einführung von CASB-Lösungen in Unternehmen bestellt?
    - Wie nutzen Security-Experten heute die CASB-Lösung, um mehr Transparenz, Compliance, Datensicherheit, Bedrohungsschutz und Zugangskontrolle zu erzielen?
    - Wie effektiv ist der Einsatz von CASB-Lösungen und wie werden sich diese Werkzeuge weiterentwickeln?
  • Live Talk: Cost of Compliance - The $270B problem. Oct 21 2020 1:00 pm UTC 60 mins
    Michael McGrath, Senior Director, Compliance and Digital Risk, Proofpoint
    Join four leading experts as they discuss why the financial industry spends $270 billion per year on maintaining compliance. The European Union’s overhaul of data privacy regulation (GDPR) is estimated to have generated 114 million euros ($126 million) in fines over the past two years – a staggering 160,000 data breach notifications.

    These almost incomprehensible numbers, hide the challenges faced by every organisation in keeping up with changing regulations while maintaining reporting and customer service.

    Join us on this Live Talk with leading experts from Thomson Reuters, PIMCO and Société Générale; as we discuss the factors driving compliance cost, together with how regulatory technology (Reg Tech) and modern-day data behaviour are evolving through 2020.

    Controlling costs is critical: Every penny saved in compliance costs is another added to the bottom line. We anticipate this panel discussion will be a rewarding and profitable event to attend.
    _______________

    The Live Talk is led by Michael McGrath, Senior Director for Compliance and Digital Risk at Proofpoint. He is joined by:

    Susannah Hammond, Senior Regulatory Intelligence Expert at Thomson Reuters.
    Dennis Sullivan, Vice President, Senior Compliance Officer at PIMCO.
    Paul Clulow-Phillips, Managing Director - Global Head of Markets Compliance and Global Head of Surveillance at Société Générale.
  • Zero-Trust Security | Cloud-Delivered: Zero-Trust Network Access Made Simple Oct 20 2020 1:00 pm UTC 45 mins
    Mark Edge
    As part of a distributed workforce that increasingly relies on technology, people are the new cybersecurity perimeter. Employees, contractors or third parties - and anyone else who has access to your sensitive data and critical systems can therefore become a threat. Protecting people and resources beyond the traditional perimeter has never been so critical in today’s cloud era.

    Join us as we uncover how a Zero-Trust Network Access can reduce security exposure and show you clear steps to deploy Zero-Trust Network Access. In this session, we’ll specifically dive in to:

    - How cloud-delivered secure remote access can be made simple.
    - How adaptive controls and micro segmented application access isolates your network from threats.
    - How a people-centric, software-defined perimeter that protects users and data both on and off-premise is the new imperative.

    Register today to gain valuable insights and best practices for protecting your people and resources beyond the traditional perimeter.
  • eSummit: Live Demo - Security Awareness Training Oct 20 2020 10:30 am UTC 29 mins
    Sean Walker, Sr. Enterprise Account Executive
    99% of the attacks in 2019 require human interaction to succeed. Attackers are becoming more sophisticated and using new lures to deliver malware, obtain credentials, and complete wire fraud. It's more important than ever to change user behavior while staying ahead of the changing threat landscape. Proofpoint Security Awareness Training helps you deliver the right training to the right people, so they have the right response to today’s dangerous attacks.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing and other threats
    - Maximize user behavior change with a wide variety of content training modules, videos, games, and sketches
    - Enable your employees to report suspicious messages with a single mouse click and have malicious messages automatically identified and removed
  • eSummit: 2nd Session - Liability to Asset: Develop Proactive & Resilient Users Oct 20 2020 9:30 am UTC 46 mins
    Mike Bailey, Sr. Product Marketing Manager & Susan Mackowiak, Sr. Dir of Security Awareness Program Content at Proofpoint
    End users are the number one threat vector for any organization. They present the greatest risk to information security, data loss, and privacy compliance. But with the right knowledge, awareness, and tools, your users can become proactive defenders, alerting you to threats and taking action to help protect your organization. So how can you turn your users from a security liability to an asset?

    Join us as our experts examine a systematic approach based on proven strategies to help you develop proactive and resilient users. In this session, we'll discuss how to:

    - Assess the knowledge and awareness needs of the organization
    - Leverage best-practices to implement a sustainable, engaging and effective program
    - Identify high-risk users, roles, and departments
    - Obtain executive buy-in and support
    - Track, communicate metrics and reports to showcase results

    *This session is eligible for one CPE credit with ISC(2). To claim your credit, please submit our online form here: https://go.proofpoint.com/webinars-submit-cpe-credit
  • eSummit: Keynote - User Behavior: Why & How to Build a Security Culture Oct 20 2020 8:30 am UTC 44 mins
    Chris Borales, Dir of Information Security Awareness at Discovery & Mark Guntrip, Marketing Director at Proofpoint
    Security awareness training is more than a countermeasure to phishing and social engineering. It is the foundation for establishing people-centric security. The responsibilities of IT users continue to increase, and organizations need to infuse their cultures with security and privacy knowledge that yields risk reduction and operational improvements.

    Join our experts as they discuss the importance of building a security-aware culture and how it brings qualitative and quantitative improvements. In this session, you’ll learn how a culture of security awareness helps:

    - Build a security culture that reduces risk
    - Identify key metrics for your organization’s people-centric risk
    - Improve efficiency related to help desks, training administration, and incident response
    - Meet training requirements for privacy

    *This session is eligible for one CPE credit with ISC(2). To claim your credit, please submit our online form here: https://go.proofpoint.com/webinars-submit-cpe-credit
  • Live Panel: Detect and Block Business Email Scams with Proofpoint Recorded: Oct 15 2020 30 mins
    Matt Cooke, Davide Canali & Neil Hammet of Proofpoint EMEA
    Business Email Compromise (BEC) often starts with an email in which attackers pose as someone the victim trusts. In the message, there’s a seemingly legitimate business request that usually involves a wire transfer or financial payment. None of these emails carries malicious payload making it difficult to detect this new form of email threat.

    But things are changing. Technology can now surpass people and process initiatives to proactively eliminate fraudulent emails, removing the guesswork for users.

    Join this expert panel discussion to learn more about:
    · How BEC attacks happen
    · Why defenders must think beyond the phish into a multi-layered approach
    · How Proofpoint provides actionable visibility and threat insights
    · How Proofpoint identifies and blocks common BEC attack tactics

    This is the third of three webinars forming a mini-summit:
    Session 1: Evolving Business Email Attack Tactics from Lockdown through to Return to Work
    Session 2: Customer Case Study - Protecting the UK's HM Revenue & Customs (HMRC) from Email Fraud
    Session 3: Live Panel - Detect and Block BEC Scams

    Links to all three sessions in the attachments.
  • Cybersecurity: Defending UK’s HM Revenue & Customs (HMRC) Against Email Fraud Recorded: Oct 13 2020 31 mins
    Neil Hammet, Senior Product Evangelist, Email Fraud Defence & Chris Clarke, Email Fraud Defence
    HMRC, the UK Government department for Revenue and Customs who manage among other things UK Corporation tax, UK Income tax and VAT, was always going to be an obvious target for cyber attacks. In 2017-2018, millions of fraudulent emails were being sent purporting to offer tax refunds to UK tax payers. Something had to be done.
     
    Join this webinar, as experts and project managers discuss:
    - HMRC’s experiences of Business Email Compromise (BEC) and Email Account Compromise (EAC)
    - The specific problems and the scale of the challenge they faced
    - How a solution was found, and the resulting success for HMRC, the IT Security team, but most of all the peace of mind offered to HMRC customers
    - How success was tracked and measured

    This is the second of three webinars forming a mini-summit:
    Session 1: Evolving Business Email Attack Tactics from Lockdown through to Return to Work
    Session 2: Customer Case Study - Protecting the UK's HM Revenue & Customs (HMRC) from Email Fraud
    Session 3: Live Panel - Detect and Block BEC Scams

    Links to all three sessions in the attachments.
  • eSummit: Live Demo - Security Awareness Training Recorded: Oct 8 2020 30 mins
    Sean Walker, Sr. Enterprise Account Executive
    99% of the attacks in 2019 require human interaction to succeed. Attackers are becoming more sophisticated and using new lures to deliver malware, obtain credentials, and complete wire fraud. It's more important than ever to change user behavior while staying ahead of the changing threat landscape. Proofpoint Security Awareness Training helps you deliver the right training to the right people, so they have the right response to today’s dangerous attacks.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing and other threats
    - Maximize user behavior change with a wide variety of content training modules, videos, games, and sketches
    - Enable your employees to report suspicious messages with a single mouse click and have malicious messages automatically identified and removed
  • eSummit: 2nd Session - Liability to Asset: Develop Proactive & Resilient Users Recorded: Oct 8 2020 47 mins
    Mike Bailey, Sr. Product Marketing Manager & Susan Mackowiak, Sr. Dir of Security Awareness Program Content at Proofpoint
    End users are the number one threat vector for any organization. They present the greatest risk to information security, data loss, and privacy compliance. But with the right knowledge, awareness, and tools, your users can become proactive defenders, alerting you to threats and taking action to help protect your organization. So how can you turn your users from a security liability to an asset?

    Join us as our experts examine a systematic approach based on proven strategies to help you develop proactive and resilient users. In this session, we'll discuss how to:

    - Assess the knowledge and awareness needs of the organization
    - Leverage best-practices to implement a sustainable, engaging and effective program
    - Identify high-risk users, roles, and departments
    - Obtain executive buy-in and support
    - Track, communicate metrics and reports to showcase results

    *This session is eligible for one CPE credit with ISC(2). To claim your credit, please submit our online form here: https://go.proofpoint.com/webinars-submit-cpe-credit
  • eSummit: Keynote - User Behavior: Why & How to Build a Security Culture Recorded: Oct 8 2020 45 mins
    Chris Borales, Dir of Information Security Awareness at Discovery & Mark Guntrip, Marketing Director at Proofpoint
    Security awareness training is more than a countermeasure to phishing and social engineering. It is the foundation for establishing people-centric security. The responsibilities of IT users continue to increase, and organizations need to infuse their cultures with security and privacy knowledge that yields risk reduction and operational improvements.

    Join our experts as they discuss the importance of building a security-aware culture and how it brings qualitative and quantitative improvements. In this session, you’ll learn how a culture of security awareness helps:

    - Build a security culture that reduces risk
    - Identify key metrics for your organization’s people-centric risk
    - Improve efficiency related to help desks, training administration, and incident response
    - Meet training requirements for privacy

    *This session is eligible for one CPE credit with ISC(2). To claim your credit, please submit our online form here: https://go.proofpoint.com/webinars-submit-cpe-credit
  • Evolving Business Email Attack Tactics from Lockdown to Return to Work Recorded: Oct 8 2020 39 mins
    Matt Cooke, CyberSecurity Specialist & Davide Canali, Senior Threat Researcher, Proofpoint EMEA
    COVID-19 not only impacts our lives but also affects cyber threat landscape, which continues to be dominated by coronavirus-related activities. Proofpoint Threat Research team has observed more and more business email compromise (BEC) and email account compromise (EAC) scams leveraging coronavirus lures. In addition, attackers have come up with more sophisticated tactics to trick their targets into making fraudulent wire transfer.

    Join our Proofpoint experts to learn more about:

    - The current state of COVID-themed BEC/EAC scams
    - New BEC tactics targeting organisation’s supply chain
    - The differences between BEC and other tactics, such as malware and cred-phish
    - Why threat actors choose a certain attack tactic and the psychology behind criminal minds

    This is the first of three webinars forming a mini-summit:
    Session 1: Evolving Business Email Attack Tactics from Lockdown through to Return to Work
    Session 2: Customer Case Study - Protecting the UK's HM Revenue & Customs (HMRC) from Email Fraud
    Session 3: Live Panel - Detect and Block BEC Scams

    Links to all three sessions in the attachments.
  • 2020 Threat Update: Financial Services & Insurance Industries Recorded: Oct 7 2020 52 mins
    John Checco, Resident CISO, Sean Odowd, FinServ Solutions Dir, Dan Blackford, Threat Research Analyst at Proofpoint
    The 2020 cyber threat landscape is constantly changing. To help financial services and insurance firms better understand evolving threats, Proofpoint researched the sector's evolving compliance, technology, and macro impacts. We’ve analyzed almost a year's worth of cyberattacks against banks, capital markets, insurance, and the financial ecosystem market. As we examine hundreds of millions of malicious emails, one trend stood out: today's attacks target people, not just infrastructure.

    Join our experts for this live webinar on the latest of cyber threat for the financial services and insurance industries. In this session, we’ll discuss:

    - The current security state of the financial services sector
    - View into the threat landscape in each segment
    - Security considerations and transformations moving forward

    *This session is eligible for one CPE credit with ISC(2). To claim your credit, please submit our online form here: https://go.proofpoint.com/webinars-submit-cpe-credit
  • Modernizing the Abuse Mailbox Recorded: Oct 6 2020 42 mins
    Tanner Luxner, Product Marketing Manager & Neal Iyer, Product Manager of Proofpoint
    An abuse mailbox is an excellent tool for end-users to report suspicious messages, but it comes with its challenges. Most security teams find themselves spending significant time sorting through bulk and marketing messages to identify and address legitimate threats. So how can you better protect your end-users while improving this process?

    Join our session to see how Proofpoint’s latest Threat Response features can help organizations automate this process in the most effective way possible. We'll also show a short live demo of our latest releases.

    In this session, you will learn:

    - How to run a modern abuse mailbox process
    - How to improve your security posture
    - The latest improvements to the Threat Response platform in release 5.3
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The 2020 State of CASB in Europe
  • Live at: Sep 3 2020 1:30 pm
  • Presented by: James Johnson, CASB Expert & Jen Gough, Competitive Specialist, Proofpoint EMEA
  • From:
Your email has been sent.
or close