Gérer l’impact d’une pandémie sur l’entreprise en qualité de RSSI - Français
Les cybercriminels continuent d'exploiter nos craintes et nos incertitudes au moyen de campagnes malveillantes dont l'unique objectif est de nous inciter à cliquer sur des liens dangereux pour notre sécurité.
Ces attaques visent directement les personnes et recourent à des techniques d'ingénierie sociale. De plus, la situation exceptionnelle que nous vivons aujourd'hui nous oblige à nous adapter rapidement et à adopter massivement le télétravail, une transition qui expose nos utilisateurs à davantage d'attaques, du phishing au piratage de la messagerie en entreprise (BEC, Business Email Compromise).
Et tandis que les cybercriminels continuent de prendre pour cible nos collaborateurs, le rôle des RSSI évolue de façon inédite. Comment les RSSI et les équipes de sécurité peuvent-ils s'adapter pour mieux protéger l'entreprise en cette année difficile ?
Fabrice Bru, RSSI, Administrateur du Club des Experts de la Sécurité de l'Information et du Numérique (CESIN), et Loïc Guézo, Senior Director, Cybersecurity Strategy de Proofpoint, font le point avec vous lors d'une intervention Live Talk de 30 minutes.
Au programme :
L'impact de la pandémie et l'évolution des campagnes de phishing exploitant le thème du COVID-19
Partage de l'expérience d'un groupe de RSSI qui ont collaboré pour adapter leurs programmes de sécurité afin de garantir une utilisation sûre et productive de l'environnement numérique, malgré la pandémie
RecordedNov 26 202035 mins
Your place is confirmed, we'll send you email reminders
Sai Chavali,Sr PMM,Proofpoint; Mirtha Collin,Ed Dir,(ISC)²; Spencer Wilcox,CSO, ED of Tech; Brandon Dunlap,Moderator
With the massive shift to remote working in 2020, organizations are racing to rethink their security programs to both guard from external attacks as well as manage risk from insiders. Modern approaches to insider threat management must incorporate investments in People, Process, and Technology. This means formalized insider threat management programs; it means investment in insider threat management technologies; and it means building resilience into the fabric of your organization with training.
Join Proofpoint and (ISC)2 on February 23, 2021 at 1:00pm Eastern as we kick off the new year with a discussion about security awareness, education and insider threat management and how best to defend your organization and arm your users to mitigate an insider incident.
Michael McGrath, Graham Ashworth & Richard Davis, Proofpoint EMEA
Collaborative technology came of age in 2020, with rapid adoption and overarching reliance on Zoom, Teams, Slack and/or Skype. Beyond the humble email, these have all become crucial tools for business activity.
2021 will be no different and these collaboration tools are here to stay. This opens up a series of new challenges for organisations, as existing supervision and e-discovery capabilities need to be extended to these platforms, to ensure compliance with all current international legislation.
So whether you are wondering how do you archive all comms including email in 2021, have challenges in accessing that archive quickly and efficiently or still unsure if you are meeting all compliance requirements, this session is just what you need…
Join us in this live discussion with leading Archiving and Compliance experts as they dive deeper into:
The use of Outlook 365 archive and when does this need to be augmented.
What to consider when reappraising content & comms compliance.
What do you need to future proof existing archiving and compliance systems for the demands of tomorrow.
Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention? Join this webinar for Proofpoint’s seventh annual State of the Phish report as it delivers critical, actionable insights into the current state of the phishing threat.
Our experts will deep dive into:
- The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses.
- The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
- How organizations are delivering phishing awareness training, and the ways they measure program success
Richard Davis | International Cybersecurity Strategist, Proofpoint
During the first six months of 2020, nearly 20 countries saw COVID-themed lures. A significant portion of scanned attachment threats leveraged COVID-19 themes, from commodity criminals to nation-state threat actors.
Very unfortunately, during the height of the pandemic in March, Healthcare organisations, compared to other industries, received approximately 16% more malicious messages associated with these campaigns.
Join us in this insightful session as we revisit a few highlights from our 2020 Healthcare Threat Landscape report and unveil some of the lessons learnt on the technologies, processes and trainings options available to help mitigate risk of a successful attacks in 2021.
Attendees will receive a free copy of Proofpoint’s Healthcare Threat Landscape report.
Rob Bolton, Insider Threat Management Director, Proofpoint
Not all users are alike. Some will pose a higher risk to your organisation than others. Managing insider threats starts with deciding which of your users pose the biggest risk when it comes to a potential incident or breach. The term “insider threat” is commonly associated with users who show malicious intent. But negligent or compromised users actually make up three-quarters of insider breaches, according to Ponemon Institute.
Join our panel of experts to learn how to identify high risk users and deploy a risk-based user and data activity monitoring strategy to protect your organisation.
In this 30-min panel, we will unveil:
- How to identify high risk users, including privileged and compromised users
- Tips to gain visibility into these high risk users, with context into user activity and data movement
- Key strategies to protect your organisation from the loss of critical data and IP
Neil Hammet, Senior Product Evangelist, Email Fraud Defence
The story behind how HMRC protects taxpayers from 99% of malicious spam.
followed by a discussion of DMARC, Supply Chain Email Fraud, Email Fraud Defence and BEC/AEC .
Business Email Compromise (BEC) and Email Account Compromise (EAC) scams have cost the victimised businesses over $26 billion since 2016. Gartner even predicts that these new forms of email threats will continue to double each year to over $5 billion through 2023. Unfortunately, there’s no silver bullet for BEC and EAC. These human-activated threats require an end-to-end solution that addresses all attack tactics.
Join us to hear how Proofpoint helped HMRC, the UK Government department for Revenue and Customs who manage among other things UK Corporation tax, UK Income tax and VAT.
- HMRC’s experiences with the changing landscapes of BEC and EAC
- The specific challenge they faced
- How Proofpoint found a solution to help them tackle this problem
- How success was tracked and measured
This recording includes highlights from the Email Security e-Summit first broadcast from September 24th 2020
Martin MacKay, Andy Rose, Loïc Guézo, Markus Grüneberg, EMEA Leadership, Proofpoint
A global pandemic, rapid digital transformation, shift to a remote workforce and a cyber threat landscape like we’ve never seen before – 2020 was anything but predictable. Prepared for the pandemic or not, infosec professionals around the globe worked tirelessly to ensure business continuity while completely rethinking their approach for the ‘new normal’.
Join Proofpoint’s European cybersecurity experts in this panel discussion as they decipher 2020’s biggest cybersecurity threats and trends. In this interactive session, we will also take a look at what our experts expect to be the 2021 cyber threat landscape. So join us to learn how you can protect your people, data and organisation in the new year.
- Look back at cybersecurity predictions for 2020
- Lessons learned and success stories
- What to expect from the threat landscape in 2021
Martin Mackay is Senior Vice President for EMEA at Proofpoint
Andrew Rose is Resident CISO for the EMEA Region at Proofpoint
Loïc Guézo is senior director of Cybersecurity Strategy at Proofpoint, SEMEA
Markus Grüneberg is Resident CISO for DACH Region at Proofpoint
Alex Lei, Adrian Covich, Andrew Warren-Nicholls, Amin Manzoori, Albert Lee, APAC Leadership team, Proofpoint
2020 has been unprecedented to say the least. Almost every company has been forced to completely rethink and implement a new cybersecurity approach while ensuring business continuity. So what have the most successful organisations done, and how can you better protect your organisation going into 2021?
Join Proofpoint cybersecurity experts as we review and discuss the biggest 2020 cybersecurity trends, examine the lessons learned, and explore top threat predictions for the next year. Our team will discuss real-world examples and the best practices for protecting your company’s most valuable assets: your people and your data.
Host: Adrian Covich - Snr Director Technical Sales, APJ
Alex Lei, SVP APJ Sales
Andrew Warren-Nicholls, Cybersecurity Specialist, APAC
Amin Manzoori, Specialist– Email Fraud Defense
Albert Lee, Director Insider Threat Management, APAC
Andrew Warren-Nicholls, Cyber Security Specialist, APJ
The holidays can be a threat to businesses and consumers alike. Fake offers and notices flood corporate and personal emails, mobile devices and social sites. Cybercriminals know people are distracted and cloak their intent as legitimate holiday commerce. The time is now to remind your users that extra caution and diligence is needed!
Join Andrew Warren-Nicholls as he sets out the best practices for better protecting your end users as the holidays approach. In this session, he'll cover:
- What methods and techniques do scammers use during the holiday season
- Examples of scams and phishing emails cybercriminals will be deploying this holiday season
- Steps and resources you can leverage during the holiday season to keep your end users safe
Thomas O'Leary, EFD Product Specialist at Proofpoint
Email scams, also known as Business Email Compromise (BEC), often start with an email in which attackers pose as someone the victim trusts. The message makes a seemingly legitimate business request that usually involves wire transfer or financial payment. These BEC scams prey on human nature and have successfully caused organizations more than $26B of financial losses since 2016.
Among various types of BEC attacks, supplier invoicing fraud often accounts for the biggest losses due to B2B payments. Unfortunately, most organizations don’t have visibility into the risk posed by their suppliers. So how can you better protect your company?
Join this live demo to learn more about the following:
- How does BEC work
- Real-life examples of BEC attempts
- How does Proofpoint address common BEC use cases and supplier fraud
Proofpoint Security Awareness Product Management Team
It’s our 2020 Proofpoint Security Awareness Training Year in Review! Everyone is welcomed to join to learn about all the great improvements we’ve made to our security awareness platform in 2020. Join us on Thursday, December 17 at 11:00 am ET/8:00 am PT for an interactive session with our Product Management team.
Here are some of the areas we’ll highlight:
- Automation & Usability: Improved administration and automation to let you do more with less including automated new-hire training, improved user management, and more
- Business Intelligence: See how we're helping you report on key outcomes important to your organization with tools like automated reporting, Results API, and enhanced reports
- Content: Dramatically increased variety and assortment of content including our acquisition of The Defence Works and partnership with TeachPrivacy
- Content Delivery: More easily discover and tailor your content for users with our industry-leading Customization Center and new Content Library
- Integrations: Leverage Proofpoint threat intelligence for better visibility into user-reported messages and new ways to address risk with our Targeted Attack Protection (TAP) integration
Sign up for the webinar and see how we’ve been accelerating innovation in 2020 – and can’t wait for 2021!
Rob Bolton and Lee Duff Insider Threat Management specialists, Proofpoint
As the workforce rapidly shifts to remote work, the complexity of protecting IP and sensitive data has grown exponentially. Old models of locking down the perimeter no longer apply. Instead, a modern, people-centric approach to Insider Threat Management can complement existing information protection programs, while providing greater visibility and context into both user behaviour and data movement.
Join us in a 30-mins Live Talk with Proofpoint’s Rob Bolton and Lee Duff Insider Threat Management specialists as they discuss:
- The types of insider threat profiles and how to address them. For example, organizations may not know how that more than 60% of insiders are negligent.
- Why insider threats are unique and require context into both user and data activity.
- How to reduce response time by accelerating investigations. The longer the response times, the costlier an incident can get.
- And more!
Markus Grüneberg, IT Security & Data Privacy Advisor bei Proofpoint
Corona hat nicht nur Auswirkungen auf unser aller Leben, auch die Bedrohungslandschaft wurde durch das Virus stark beeinflusst. Das Proofpoint Threat Research Team hat in den letzten Monaten mehr und mehr zielgerichtete BEC (Business Email Compromise)- und EAC (Email Account Compromise)-Angriffe beobachtet, die mit der Angst vor Corona zu ködern versuchten.Nehmen Sie teil am Webinar mit Markus Grüneberg, IT Security & Data Privacy Advisor bei Proofpoint, wenn es um folgende Themen geht:
Die aktuelle Bedrohungslandschaft
Neue BEC Taktiken, die Lieferketten ins Visier nehmen
Unterschiede zwischen BEC und anderen Taktiken wie Malware und Anmeldedaten Phishing
Warum Cyberkriminelle sich für eine und nicht die andere Taktik entscheiden – ein psychologischer Exkurs.
Dustin Hannifin, Cloud Security Solutions Architect at Proofpoint
As a valued CASB customer, did you know that you can optimize your CASB solution for cloud threat protection and data security through integrations with the rest of the Proofpoint's platform?
Join us live demo as our expert demonstrates the people-centric approach of these integrations. In this session we will cover:
- Email and cloud threat correlation and Very Attacked People (VAP) policies enabled by integrations with Proofpoint Targeted Attack Protection
- Adaptive access and data controls enabled by integration with Proofpoint Browser Isolation
- DLP classification shared across email, cloud and endpoint and unified incident management as part of Proofpoint Enterprise DLP
Whether a high risk user receives an email or a security analyst needs to triage a threat, isolating the clicks on URLs is imperative to the security of the organization. So how can you lower your attack surface and protect your people against advanced threats at the same time?
Join us for this customer exclusive 30-minute live demo as our experts show you how our Browser Isolation integration augments Targeted Attack Protection (TAP) and Threat Response Auto-Pull (TRAP). This session will cover how to:
- Protect your high-risk users with adaptive isolation controls
- Streamline your abuse mailbox triaging speed
- Utilize other feature releases in TRAP 5.4
Michael McGrath, Senior Director, Compliance and Digital Risk, Proofpoint
Join four leading experts as they discuss why the financial industry spends $270 billion per year on maintaining compliance. The European Union’s overhaul of data privacy regulation (GDPR) is estimated to have generated 114 million euros ($126 million) in fines over the past two years – a staggering 160,000 data breach notifications.
These almost incomprehensible numbers, hide the challenges faced by every organisation in keeping up with changing regulations while maintaining reporting and customer service.
Join us on as we discuss:
- The factors driving compliance cost
- How regulatory technology (Reg Tech) and modern-day data behaviour are evolving through 2020
Controlling costs is critical: Every penny saved in compliance costs is another added to the bottom line. We anticipate this panel discussion will be a rewarding and profitable event to attend.
The talk is led by Michael McGrath, Senior Director for Compliance and Digital Risk at Proofpoint. He is joined by:
Susannah Hammond, Senior Regulatory Intelligence Expert at Thomson Reuters.
Dennis Sullivan, Vice President, Senior Compliance Officer at PIMCO.
Paul Clulow-Phillips, Managing Director - Global Head of Markets Compliance and Global Head of Surveillance at Société Générale.
Mike Bailey, Sr. Product Marketing Manager at Proofpoint & Jamie Nelson, Proofpoint Customer
For years, security awareness has been based on hypotheticals. Who clicked on a simulated attack? Who scored what in training? How many people participated in the program? That’s helpful but doesn’t directly translate to real risk improvements. Learn how you can focus your security awareness program by getting visibility into what’s really happening in your environment.
Join us for a webinar as we introduce the new integrations with Proofpoint's advanced email security and threat intelligence. We'll talk about:
- How to protect users who are being targeted and engaging with known malicious content
- What actions to take for users who are reporting real vs. non-malicious threats
- What the strategy is for these cutting-edge integrations in the future
Randy Raw, VP of Information Security at Veterans United Home Loans & Brian Reed, Insider Threat DLP Evangelist at Proofpoint
Traditional DLP hasn’t lived up to its promises. That's because data loss begins with people - whether they are negligent, compromised by external actors, or malicious insiders. Today, data loss prevention (DLP) and insider risk are top of mind for companies with a distributed workforce and increasing reliance on technology. So how can you better protect your organization?
Join our experts for a conversation on why organizations need to take a modern, people-centric approach that provides visibility and context into content, user behavior, and threat insights to mitigate this risk. In this webinar, you'll learn:
- The importance understanding user risk profiles
- How to better understand and respond to people-led data breaches
- Real-world examples and best practices to improve your data and user security
*All sessions are eligible for CPE credits with ISC(2). You must be an active member with ISC(2) to receive credit. To submit your credits, please visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Yair Grindlinger, VP & GM of Information Protection & Roie Cohen-Duwek, Dir. of Security Reserach at Proofpoint
Cyber criminals are increasingly blending both email and cloud vectors, whereby a single malicious email can lead to an infiltrated cloud account. Since 94% of data breaches start with attacks targeting people via email, organizations need a holistic approach and solution to combine security efforts across all channels. So how is this achieved?
Join our experts as they expose how attackers use cloud services, like Microsoft SharePoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC/EAC attack. In this session we’ll cover:
- Trends and modern threat landscape
- Case studies on how threat actors leverage legitimate cloud services to launch attacks
- How to address these sophisticated hybrid attacks
*All sessions are eligible for CPE credits with ISC(2). You must be an active member with ISC(2) to receive credit. To submit your credits, please visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Gérer l’impact d’une pandémie sur l’entreprise en qualité de RSSI - FrançaisFabrice Bru, RSSI, Administrateur du CESIN, Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]35 mins