Hi [[ session.user.profile.firstName ]]

Improving Threat Detection & Data Protection in Public Clouds

Beyond just capturing “shadow IT” have you reached the full potential of your CASB? With a continuous stream of feature enhancements from User Entity Behavior Analysis to Data Loss Prevention, you may have more capabilities that are going untapped. Leveraging your CASBs to its fullest potential can result in a better security posture for your organization. Join Proofpoint and (ISC)2 on October 1, 2020 at 1:00 p.m. eastern for a discussion centered around CASBs, their potential for better security via threat protection and data protection.
Recorded Oct 1 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Itir Clarke, Sr. Product Mktg Mgr Proofpoint; John Yeoh, Global VP, CSA; Michael Weisberg, CISO Garnet Rive,
Presentation preview: Improving Threat Detection & Data Protection in Public Clouds

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Four Best Practices to Combat Insider Threats in Your Supply Chain Jun 16 2021 9:00 am UTC 45 mins
    Rob Bolton, Senior Director, Information Protection, Proofpoint EMEA
    Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches.

    Safeguarding your organisation's IP and user data relies upon a people-centric approach to managing insider risk.
    Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches.

    Safeguarding your organisations’ IP and user data relies upon a people-centric approach to managing insider risk.

    Join us as we discuss how the technology sector and others in agile, collaborative industries can manage insider threats. In this session, you will learn how to:

    - Allow for open collaboration by using data to identify user risk
    - Protect your competitive advantage with real-time IP data tracking
    - Safeguard user data when working with third parties to remain compliant
    - Prepare your incident response plan to avoid unnecessary data loss
  • Seeing the Attacker’s View: A People-Centric Approach to Security Discussion May 18 2021 1:00 pm UTC 45 mins
    Richard Davis, Cyber Security Strategist, Proofpoint & Dominic Trott, UK Product Manager, Orange Cyberdefense
    It’s no secret that modern attackers have pivoted to targeting people, largely via simple phishing emails. A simple internet search can tell them all they need to know about who has access to the system or data they are targeting.

    You likely know that email fraud, or BEC, is costing organizations billions of dollars. But do you know why these attacks continue to reach new levels of success?

    Join this session as we discuss how you can identify your most attacked and riskiest users, understand how they are being attacked and design better strategies and protections to prevent these attacks being successful and minimise your cybersecurity risk.
  • How to Navigate Insider Risk: Top Tips from Gartner's Market Guide May 11 2021 9:00 am UTC 60 mins
    Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, Proofpoint
    Insider threats may initially appear to be just like any other threat, but the big difference is that insiders are in a position of trust. So how do you deal with these malicious or accidental threats that come from people within the organisation?

    Watch Proofpoint’s experts Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, as they discuss the top tips from Gartner’s new report on Market Guide for Insider Risk Management Solutions. You will learn:

    - The “Rule of Three” for insider threats (including threat types, threat activities, and mitigation goals)
    - How to employ an insider threat mitigation program comprising people, processes, and technology
    - Considerations when purchasing insider risk management technology

    Discover what you need to know about insider threats, how to protect your organisation and navigate these risks.
  • Live Demo: Identify, Report & Prevent Phishing with Security Awareness Training Recorded: May 6 2021 29 mins
    Kevin Rohm, Account Executive, Proofpoint, Inc.
    99% of the phishing attacks require human interaction to succeed, potentially exposing your organization to email fraud, ransomware, data loss and breaches.

    Educate your users and reduce your phishing risk through Proofpoint’s industry-leading security awareness solution. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Watch our 30-minute live demo to learn how to:

    - Prepare users for new attacks by leveraging threat intelligence to continuously understand which people and what threats are targeting your organization
    - Assess your users’ susceptibility to phishing attacks and social engineering
    - Drive behavior change by turning your users into security assets with engaging, relevant and entertaining training
  • The Cost of Cloud Compromise and Shadow IT Recorded: May 5 2021 61 mins
    Larry Ponemon, Ponemon Institute and Itir Clarke, Proofpoint
    With the increased use of SaaS applications, cloud account takeover and Shadow IT present an increasing security risk to organizations. As the network perimeter is replaced by a user-defined security perimeter, it becomes critical to evaluate access controls, threat detection and data security in the cloud. So how can you better protect your company?

    Join us for this special webinar with experts from Proofpoint and Ponemon Institute. They will discuss the findings of the newly conducted research among IT and security professionals to determine the risk and cost of cloud account takeovers and Shadow IT.
    In this session, we’ll cover:
    • The state of cloud usage in organizations
    • Security risks and practices to secure the cloud
    • Cloud compromises and the end user risk
    • The cost of compromised cloud accounts
  • Compliance & Risk Mitigation for Healthcare Recorded: May 4 2021 36 mins
    Ryan Witt, Healthcare Industry Practice Leader, Robert Kreuscher, Sr. Sales Engineer, Shannon Smith, Archive Sales Specialist
    Cloud-based applications like Microsoft 365 keep your healthcare organization operating, especially in today’s digital world. Yet securing data, adhering to data privacy and record keeping, while protecting against fraudulent activity, can be a significant challenge. Healthcare organizations need a people-centric approach to detecting risky behavior and litigation readiness.

    Watch our 30-minute panel discussion about how your peers are addressing these challenges and the steps you can take to ensure compliance across your electronic communications ecosystem. This session covers:

    - Common compliance challenges and pitfalls when it comes to e-discovery and risk detection, especially around Microsoft 365
    - How your capture and archive strategy can augment your information protection program
    - How Proofpoint’s people-centric approach to security and compliance helps better protect healthcare organizations
  • Security Leaders' Panel: Has Phishing Reached a Crisis Level? Recorded: Apr 29 2021 80 mins
    Lucia Milica, CISO, Proofpoint, Robbie Meitler, AVP, Liberty Mutual, Rebecca Harness, CISO, Saint Louis University
    Phishing and social engineering attacks continue to grow in frequency and sophistication. They challenge security leaders and practitioners who struggle to track and stop their elusive and persistent tactics. Given the magnitude of the challenge, many security leaders consider this their No. 1 priority for 2021.

    Join our customer and CISO panel to learn more about these threats and how security leaders are using intelligence, controls and their people to reduce the risk of breach and data loss.

    In this session, our experts will cover:

    -How phishing and social engineering attacks have increased
    -How organizations are being targeted
    -How your company culture affect risk
    -Options for you to better protect you company
  • Managing Insider Risk with a Hybrid Workforce - Featuring Forrester Research Recorded: Apr 27 2021 61 mins
    Brian Reed, Product Evangelist, Proofpoint, Inc., Joseph Blankenship, VP and Research Director for Security & Risk, Forrester
    After a year of remote work, we are beginning the return to “normalcy” in many places. So what happens as the workforce shifts to a hybrid model of partial in-person and partial remote work? How do you guard from external attacks and manage insider risks – whether accidental or malicious?

    Watch our special 1-hour webinar with guest speaker, Forrester Research’s Joseph Blankenship, VP and Research Director for Security & Risk, to discuss key insider threat factors with a remote and hybrid workforce.

    This webinar covers:

    · What the trend towards hybrid work means for organizations that are dependent on third-party users and supply chain vendors
    · How to share information in a way that protects against data loss
    · How to build a business case for an insider threat management program (ITMP)
  • In the Bullseye: Healthcare and Email Threat Vectors Recorded: Apr 27 2021 62 mins
    Ryan Witt, Proofpoint; John Carnes, Information Security Professional; Shelly Epps, Duke Health; Brandon Dunlap, Moderator
    Threat actors are targeting individuals in the Healthcare industry and using email as their main entry point for cyber attacks. These attacks are aimed at specific people in an organization to steal money, data or sensitive healthcare information. Threat actors can gain access to legitimate mailboxes using tactics such as phishing, malware or social engineering to impersonate the victim. This leads to further infiltration into an enterprise system. What can those in the healthcare industry do to combat this targeting by cyber criminals? Join Proofpoint and (ISC)2 on April 27th at 1 pm ET / 10 am PT for a panel discussion focusing on email compromise/account takeovers and best practices for dealing with these threats in healthcare.
  • How to Create a Risk-Based Data Privacy Program Recorded: Apr 23 2021 36 mins
    Itir Clarke, Senior Product Marketing Manager, Proofpoint, Inc., Lucia Milica, Global Resident CISO, Proofpoint, Inc.
    Data privacy regulations are growing more complex, and the penalties for noncompliance can be severe. Companies need a risk-based approach to PII protection across email, cloud apps and endpoint to prioritize and address compliance challenges in the cloud era. This requires visibility to data risk, but also people risk. So how can you achieve this?

    Watch our 30-minute webinar with Lucia Milică, Proofpoint Global Resident CISO, to learn how a people-centric approach to Information Protection can help you achieve a risk-adjusted privacy program:

    We cover how you can:

    - Discover which data and people pose greater PII compliance risks
    - Reduce risk by training and improving data traceability
    - Keep privacy data safe using people-centric controls and reporting
  • How to Defend Against Email Fraud from Compromised Suppliers Recorded: Apr 23 2021 32 mins
    Sara Pan, Sr. Product Marketing Manager, Proofpoint
    Email fraud schemes have evolved to include supplier account compromise. Based on Proofpoint’s internal research, 98% of monitored organizations have received threats from their suppliers— whether they’ve been spoofed or compromised. Unfortunately, most organizations lack visibility into which suppliers pose risk. So how can you better defend against threats from these risky suppliers?

    Watch our webinar for a deep dive into the best practices of combating supplier impersonation and account compromise. In this session, we'll cover:

    - Real-world supply chain fraud examples
    - Grading risk in your suppliers
    - How to detect threats, including payroll diversion and supplier invoicing fraud
    - A framework that helps you stop these multi-million-dollar email fraud attacks
  • Uno sguardo ai dati d’analisi fruibili del report State of the Phish 2021 Recorded: Apr 22 2021 58 mins
    Luca Maiocchi & Daniele Barison, Proofpoint Italy
    Mentre entriamo nel secondo anno della pandemia globale, i team IT e della sicurezza delle informazioni continuano ad affrontare sfide su tutti i fronti. Oltre alle “comuni” problematiche di cybersecurity, stanno affrontando un'esplosione di truffe di phishing legate alla pandemia e un aumento degli attacchi ransomware. Quanto sono preparati gli utenti?

    Unisciti a noi per conoscere i risultati del settimo report annuale State of the Phish di Proofpoint, che fornisce informazioni utili derivanti da un’indagine globale di 3.500 professionisti in oltre 6 paesi, dall’analisi di oltre 60 milioni di simulazioni di attacchi di phishing e di più di 15 milioni di email sospette segnalate tramite PhishAlarm di Proofpoint.

    Nel corso di questa sessione di 30 minuti, approfondiremo i seguenti temi:
    • Le lacune a livello di consapevolezza e le competenze degli utenti che potrebbero avere un impatto negativo sulle tue difese
    • L’impatto degli attacchi di phishing sui professionisti della sicurezza delle informazioni e come stanno cercando di contrastare queste minacce
    • Le best practice per fornire formazione di sensibilizzazione al phishing e attività di tracciamento efficaci

    I partecipanti riceveranno una copia del settimo report annuale State of The Phish di Proofpoint
  • El estado del panorama de amenazas de phishing: State of the Phish 2021 Recorded: Apr 22 2021 60 mins
    Nuria Andres & Fernando Anaya, Proofpoint Iberia
    Mientras la pandemia mundial se adentra en su segundo año, los equipos de TI y de seguridad de la información siguen enfrentándose a desafíos por todos lados. Además de los problemas de ciberseguridad "ordinarios", se enfrentan a un incremento explosivo del número de timos de phishing sobre temas relacionados con la pandemia, así como a un fuerte incremento de los ataques de ransomware. ¿Cuál es el nivel de preparación de los usuarios?

    Únase a nosotros en nuestro análisis de las conclusiones del 7.º informe State of the Phish de Proofpoint, que incluye información práctica procedente de: una encuesta mundial de 3500 profesionales de 6 países; el análisis de más de 60 millones de ataques de phishing simulados y más de 15 millones de mensajes de correo electrónico sospechosos denunciados a través de PhishAlarm de Proofpoint.


    En esta sesión de 30 minutos, profundizaremos en:

    - Las lagunas de concienciación y formación de los usuarios que pueden debilitar sus defensas de ciberseguridad.
    - La experiencia de los profesionales de la seguridad como resultado de los ataques de phishing y los métodos que emplean para intentar combatir estas amenazas.
    - Las mejores prácticas para ofrecer formación para concienciar sobre el phishing y realizar un seguimiento adecuado.

    Los participantes recibirán una copia del 7.º informe anual State of the Phish de Proofpoint.
  • Die Phishing-Bedrohung – eine Bestandsaufnahme Erkenntnisse aus Proofpoints 2021 Recorded: Apr 22 2021 58 mins
    Henning Hanke & Volker Korsch, Solution Specialist, Proofpoint
    Sicherheitsteams kämpfen an allen Fronten. Neben „gewöhnlichen“ Cybersicherheitsproblemen müssen sie sich seit nunmehr einem Jahr zusätzlich mit einer Welle an Corona-bezogenen Betrugsversuchen sowie einer beständigen Flut von Ransomware-Angriffen herumschlagen. Doch wie widerstandsfähig sind Mitarbeiter gegenüber Phishing-Angriffen und Social Engineering inzwischen geworden?

    Bereits das siebte Jahr in Folge analysiert Proofpoint anhand der Ergebnisse simulierter Phishing-Mails, wie es um das Sicherheitsbewusstsein von IT-Anwendern bestellt ist. Diese Erkenntnisse wurden zudem im Kontext einer Umfrage unter 3500 Infosec-Profis bewertet. Hätten Sie vermutet, dass nur 15 % der deutschen Unternehmen ihre Anwender zu Compliance-bezogenen Themen wie der DSGVO schulen?

    - Wo ist Cybersecurity-Knowhow vorhanden und an welchen Stellen gibt es Wissenslücken, die das Risiko erhöhen, Opfer von Cyber-Angriffen zu werden.
    - Während zwar 65 % der deutschen Angestellten verstehen, dass die E-Mail-Absenderdaten gefälscht sein können, weiß nur jeder Vierte mit dem Begriff Ransomware etwas anzufangen.
    - Best Practices für Schulungen zur Steigerung des Sicherheitsbewusstseins sowie Tipps zur Erfolgsmessung runden das Webinar ab. Diskutieren Sie mit uns zum Thema Konzequenzmodelle!
  • Le point sur les données du rapport State of the Phish 2021 Recorded: Apr 22 2021 40 mins
    Loïc Guézo Directeur Senior, Stratégie Cybersécurité & Quentin Habert, Proofpoint
    Alors que nous entamons la deuxième année de pandémie mondiale, les équipes informatiques et de sécurité des informations continuent à faire face à des défis provenant de tous les horizons. Outre les défis de cybersécurité dont elles ont l'habitude, elles doivent gérer l'explosion des escroqueries de phishing sur le thème de la pandémie et la progression des attaques de ransomwares. Dans quelle mesure les utilisateurs y sont-ils préparés ?

    Rejoignez-nous pour découvrir les conclusions du septième rapport annuel State of the Phish de Proofpoint, qui repose sur une enquête mondiale menée auprès de 3 500 professionnels dans six pays dont la France, ainsi que sur l'analyse de plus de 60 millions de simulations d'attaques de phishing et de plus de 15 millions d'emails suspects signalés via PhishAlarm.
    Au programme de ce webinaire de 30 minutes :

    • Sensibilisation des utilisateurs et lacunes dans leurs connaissances susceptibles de nuire à vos défenses
    • Problèmes auxquels font face les équipes de sécurité des informations à la suite d'attaques de phishing et méthodes qu'elles emploient pour contrer ces menaces
    • Bonnes pratiques en matière de formation de sensibilisation au phishing et de suivi des progrès

    Les participants recevront un exemplaire du septième rapport annuel State of the Phish de Proofpoint.
  • The State of the Phish: The View from Australia and Singapore Recorded: Apr 22 2021 53 mins
    Andrew Warren-Nicholls & Adam Plotnikov, Cybersecurity Specialists, Proofpoint
    As the global pandemic enters its second year, IT and infosec teams continue to face challenges on all sides. On top of “ordinary” cybersecurity issues, they’re dealing with an explosion of pandemic-themed phishing scams and a surge in ransomware attacks. How well prepared are users?

    Join us as we cover the findings of Proofpoint’s 7th annual State of the Phish report which delivers actionable insights resulting from: a global survey of 3,500 professionals across over 6 countries; analysis of over 60 million simulated phishing attacks and over 15 million suspect emails reported via the Proofpoint’s PhishAlarm.
    In this 30 minute session, we will dive into:

    The end-user awareness and knowledge gaps that could be negatively impacting your defences
    What infosec professionals are experiencing as a result of phishing attacks and ways they’re attempting to combat these threats
    The best practices for delivering phishing awareness training and success tracking
  • The State of the Phish: A Look at User Awareness, Vulnerability and Resilience Recorded: Apr 20 2021 39 mins
    Andy Rose, Resident CISO and Matt Cooke Cybersecurity Specialist
    As the global pandemic enters its second year, IT and infosec teams continue to face challenges on all sides. On top of “ordinary” cybersecurity issues, they’re dealing with an explosion of pandemic-themed phishing scams and a surge in ransomware attacks. How well prepared are users?

    Join us as we cover the findings of Proofpoint’s 7th annual State of the Phish report which delivers actionable insights resulting from: a global survey of 3,500 professionals across over 6 countries; analysis of over 60 million simulated phishing attacks and over 15 million suspect emails reported via the Proofpoint’s PhishAlarm.
    In this 30 minute session, we will dive into:

    - The end-user awareness and knowledge gaps that could be negatively impacting your defences
    - What infosec professionals are experiencing as a result of phishing attacks and ways they’re attempting to combat these threats
    - The best practices for delivering phishing awareness training and success tracking


    Attendees will receive a copy of Proofpoint’s 7th annual State of the Phish report
  • Security Awareness Excellence: The Tip of the Iceberg Recorded: Apr 16 2021 54 mins
    Mike Bailey Senior PMM, Security Awareness & Brian Reed, Cybersecurity Strategy, Proofpoint
    You’ve sent out the phishing simulations. Assigned the appropriate training. Worked hard to get the word out about your program. Is it enough? Or just the tip of the iceberg?

    With security awareness, what you don’t know can hurt you. If you don’t know which users are being targeted by attackers, how can you protect them? If you don’t know users who are “click happy” with real malicious messages, how can you reduce your risk?

    Join us for a paradigm-shifting conversation on how “new-school” security awareness isn’t enough to address real people-centric risk.

    We’ll cover:

    - Ensuring a laser-focused approach to maximize your risk reduction
    - How metrics like click rate and reporting rate factor into your program
    - Engaging users to make them part of the IT security team
  • Live Demo: How to Use Supervision Technology to Mitigate Risk Recorded: Apr 15 2021 29 mins
    Robert Kreuscher, Senior Sales Engineer, John Pepe, Market Development Principal, Shawn Aquino, Sr. PMM, Proofpoint
    Monitoring digital communications has long been a standard practice for highly regulated organizations to ensure that they meet compliance standards.

    But what are other use cases for supervision?

    Watch our 30-minute live demo to learn how you can utilize supervision technology to mitigate conduct risk in broad areas of exposure, such as toxic workplace, mergers and acquisitions, and brand reputation. We’ll cover how to:

    · Monitor for infractions and post-event investigations
    · Identify major potential risks, including high-risk individuals and view violation trends over time
    · Use analytics tools to understand the deeper context and inter-relationships of communications
  • Live Demo: Identify, Report & Prevent Phishing with Security Awareness Training Recorded: Apr 14 2021 33 mins
    Karl Hart, Account Executive, Proofpoint, Inc.
    99% of the phishing attacks require human interaction to succeed, potentially exposing your organization to email fraud, ransomware, data loss and breaches.

    Educate your users and reduce your phishing risk through Proofpoint’s industry-leading security awareness solution. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Watch our 30-minute live demo to learn how to:

    - Prepare users for new attacks by leveraging threat intelligence to continuously understand which people and what threats are targeting your organization
    - Assess your users’ susceptibility to phishing attacks and social engineering
    - Drive behavior change by turning your users into security assets with engaging, relevant and entertaining training
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Improving Threat Detection & Data Protection in Public Clouds
  • Live at: Oct 1 2020 5:00 pm
  • Presented by: Itir Clarke, Sr. Product Mktg Mgr Proofpoint; John Yeoh, Global VP, CSA; Michael Weisberg, CISO Garnet Rive,
  • From:
Your email has been sent.
or close