Hi [[ session.user.profile.firstName ]]

Hindsight 20/20 & Cybersecurity trends for 2021

A global pandemic, rapid digital transformation, shift to a remote workforce and a cyber threat landscape like we’ve never seen before – 2020 was anything but predictable. Prepared for the pandemic or not, infosec professionals around the globe worked tirelessly to ensure business continuity while completely rethinking their approach for the ‘new normal’.

Join Proofpoint’s European cybersecurity experts in this panel discussion as they decipher 2020’s biggest cybersecurity threats and trends. In this interactive session, we will also take a look at what our experts expect to be the 2021 cyber threat landscape. So join us to learn how you can protect your people, data and organisation in the new year.

We’ll cover:
- Look back at cybersecurity predictions for 2020
- Lessons learned and success stories
- What to expect from the threat landscape in 2021

Panellists:
Martin Mackay is Senior Vice President for EMEA at Proofpoint
Andrew Rose is Resident CISO for the EMEA Region at Proofpoint
Loïc Guézo is senior director of Cybersecurity Strategy at Proofpoint, SEMEA
Markus Grüneberg is Resident CISO for DACH Region at Proofpoint
Recorded Jan 15 2021 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Martin MacKay, Andy Rose, Loïc Guézo, Markus Grüneberg, EMEA Leadership, Proofpoint
Presentation preview: Hindsight 20/20 & Cybersecurity trends for 2021

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Approaches to Managing Insider Risk in a Work-from-Anywhere World Feb 23 2021 6:00 pm UTC 60 mins
    Sai Chavali,Sr PMM,Proofpoint; Mirtha Collin,Ed Dir,(ISC)²; Spencer Wilcox,CSO, ED of Tech; Brandon Dunlap,Moderator
    With the massive shift to remote working in 2020, organizations are racing to rethink their security programs to both guard from external attacks as well as manage risk from insiders. Modern approaches to insider threat management must incorporate investments in People, Process, and Technology. This means formalized insider threat management programs; it means investment in insider threat management technologies; and it means building resilience into the fabric of your organization with training.

    Join Proofpoint and (ISC)2 on February 23, 2021 at 1:00pm Eastern as we kick off the new year with a discussion about security awareness, education and insider threat management and how best to defend your organization and arm your users to mitigate an insider incident.
  • Five Archiving & Compliance Rules for O365 Email, Teams, Zoom or Slack in 2021 Feb 11 2021 2:00 pm UTC 45 mins
    Michael McGrath, Graham Ashworth & Richard Davis, Proofpoint EMEA
    Collaborative technology came of age in 2020, with rapid adoption and overarching reliance on Zoom, Teams, Slack and/or Skype. Beyond the humble email, these have all become crucial tools for business activity.

    2021 will be no different and these collaboration tools are here to stay. This opens up a series of new challenges for organisations, as existing supervision and e-discovery capabilities need to be extended to these platforms, to ensure compliance with all current international legislation.

    So whether you are wondering how do you archive all comms including email in 2021, have challenges in accessing that archive quickly and efficiently or still unsure if you are meeting all compliance requirements, this session is just what you need…

    Join us in this live discussion with leading Archiving and Compliance experts as they dive deeper into:

    The use of Outlook 365 archive and when does this need to be augmented.
    What to consider when reappraising content & comms compliance.
    What do you need to future proof existing archiving and compliance systems for the demands of tomorrow.
  • 2021 State of the Phish Report Feb 10 2021 6:00 pm UTC 60 mins
    ISSA International
    Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention? Join this webinar for Proofpoint’s seventh annual State of the Phish report as it delivers critical, actionable insights into the current state of the phishing threat.

    Our experts will deep dive into:

    - The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses.
    - The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
    - How organizations are delivering phishing awareness training, and the ways they measure program success
  • 2021 Healthcare: Mitigating the Risk of Successful Cyber Attacks Recorded: Jan 26 2021 41 mins
    Richard Davis | International Cybersecurity Strategist, Proofpoint
    During the first six months of 2020, nearly 20 countries saw COVID-themed lures. A significant portion of scanned attachment threats leveraged COVID-19 themes, from commodity criminals to nation-state threat actors.

    Very unfortunately, during the height of the pandemic in March, Healthcare organisations, compared to other industries, received approximately 16% more malicious messages associated with these campaigns.

    Join us in this insightful session as we revisit a few highlights from our 2020 Healthcare Threat Landscape report and unveil some of the lessons learnt on the technologies, processes and trainings options available to help mitigate risk of a successful attacks in 2021.

    Attendees will receive a free copy of Proofpoint’s Healthcare Threat Landscape report.
  • High Risk Users: Who Are They and How Do You Protect Your Organisation? Recorded: Jan 19 2021 25 mins
    Rob Bolton, Insider Threat Management Director, Proofpoint
    Not all users are alike. Some will pose a higher risk to your organisation than others. Managing insider threats starts with deciding which of your users pose the biggest risk when it comes to a potential incident or breach. The term “insider threat” is commonly associated with users who show malicious intent. But negligent or compromised users actually make up three-quarters of insider breaches, according to Ponemon Institute.

    Join our panel of experts to learn how to identify high risk users and deploy a risk-based user and data activity monitoring strategy to protect your organisation.

    In this 30-min panel, we will unveil:

    - How to identify high risk users, including privileged and compromised users
    - Tips to gain visibility into these high risk users, with context into user activity and data movement
    - Key strategies to protect your organisation from the loss of critical data and IP

    Sign up for the webinar today.
  • How HMRC fends off phishing attacks. Recorded: Jan 15 2021 42 mins
    Neil Hammet, Senior Product Evangelist, Email Fraud Defence
    The story behind how HMRC protects taxpayers from 99% of malicious spam.
    followed by a discussion of DMARC, Supply Chain Email Fraud, Email Fraud Defence and BEC/AEC .

    Business Email Compromise (BEC) and Email Account Compromise (EAC) scams have cost the victimised businesses over $26 billion since 2016. Gartner even predicts that these new forms of email threats will continue to double each year to over $5 billion through 2023. Unfortunately, there’s no silver bullet for BEC and EAC. These human-activated threats require an end-to-end solution that addresses all attack tactics.

    Join us to hear how Proofpoint helped HMRC, the UK Government department for Revenue and Customs who manage among other things UK Corporation tax, UK Income tax and VAT.

    - HMRC’s experiences with the changing landscapes of BEC and EAC
    - The specific challenge they faced
    - How Proofpoint found a solution to help them tackle this problem
    - How success was tracked and measured

    This recording includes highlights from the Email Security e-Summit first broadcast from September 24th 2020
  • Hindsight 20/20 & Cybersecurity trends for 2021 Recorded: Jan 15 2021 57 mins
    Martin MacKay, Andy Rose, Loïc Guézo, Markus Grüneberg, EMEA Leadership, Proofpoint
    A global pandemic, rapid digital transformation, shift to a remote workforce and a cyber threat landscape like we’ve never seen before – 2020 was anything but predictable. Prepared for the pandemic or not, infosec professionals around the globe worked tirelessly to ensure business continuity while completely rethinking their approach for the ‘new normal’.

    Join Proofpoint’s European cybersecurity experts in this panel discussion as they decipher 2020’s biggest cybersecurity threats and trends. In this interactive session, we will also take a look at what our experts expect to be the 2021 cyber threat landscape. So join us to learn how you can protect your people, data and organisation in the new year.

    We’ll cover:
    - Look back at cybersecurity predictions for 2020
    - Lessons learned and success stories
    - What to expect from the threat landscape in 2021

    Panellists:
    Martin Mackay is Senior Vice President for EMEA at Proofpoint
    Andrew Rose is Resident CISO for the EMEA Region at Proofpoint
    Loïc Guézo is senior director of Cybersecurity Strategy at Proofpoint, SEMEA
    Markus Grüneberg is Resident CISO for DACH Region at Proofpoint
  • 2020 Year in Review: What’s Next in 2021? - APJ, APAC Regional Edition Recorded: Jan 7 2021 48 mins
    Alex Lei, Adrian Covich, Andrew Warren-Nicholls, Amin Manzoori, Albert Lee, APAC Leadership team, Proofpoint
    2020 has been unprecedented to say the least. Almost every company has been forced to completely rethink and implement a new cybersecurity approach while ensuring business continuity. So what have the most successful organisations done, and how can you better protect your organisation going into 2021?

    Join Proofpoint cybersecurity experts as we review and discuss the biggest 2020 cybersecurity trends, examine the lessons learned, and explore top threat predictions for the next year. Our team will discuss real-world examples and the best practices for protecting your company’s most valuable assets: your people and your data.

    Host: Adrian Covich - Snr Director Technical Sales, APJ

    Panellists:
    Alex Lei, SVP APJ Sales
    Andrew Warren-Nicholls, Cybersecurity Specialist, APAC
    Amin Manzoori, Specialist– Email Fraud Defense
    Albert Lee, Director Insider Threat Management, APAC
  • さようならPPAP パスワードZipファイル運用から正しいメッセージングへ - 30分で分かるPPAPに代わる対処法 - ウェビナー Recorded: Jan 4 2021 28 mins
    シニア エバンジェリスト 増田 幸美 / セールスエンジニアリング部部長 高橋 哲也
    デジタル庁の平井大臣が、パスワード付きZipファイルをメールで送る習慣をやめると宣言し、話題になりました。
    実は、このPPAPと呼ばれるビジネス習慣は日本では独特のもので、海外ではパスワード付きZipファイルがメールでくると、「マルウェア(ウイルス)が来た!」とセキュリティチームで盛り上がるという話もあります。
    パスワード付きZipファイルは、セキュリティ製品の中身で完全に検査できるものではないために、海外ではほぼパスワード付きZipファイルをメールで送付することはありません。しかし日本では長年の間、この奇習が染みついてきました。
    このセミナーでは、PPAPがなぜ悪いのか、そのメリットとデメリットを比較し、どのように対応すればよいのかの材料になる情報をお届けしたいと思います。
  • Beware of Holiday Phishing Scams Recorded: Dec 21 2020 29 mins
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ
    The holidays can be a threat to businesses and consumers alike. Fake offers and notices flood corporate and personal emails, mobile devices and social sites. Cybercriminals know people are distracted and cloak their intent as legitimate holiday commerce. The time is now to remind your users that extra caution and diligence is needed!

    Join Andrew Warren-Nicholls as he sets out the best practices for better protecting your end users as the holidays approach. In this session, he'll cover:

    - What methods and techniques do scammers use during the holiday season
    - Examples of scams and phishing emails cybercriminals will be deploying this holiday season
    - Steps and resources you can leverage during the holiday season to keep your end users safe

    Specific focus on Asia-Pacific Region
  • Live Demo: How to Stop Supply Chain Email Fraud Recorded: Dec 17 2020 32 mins
    Thomas O'Leary, EFD Product Specialist at Proofpoint
    Email scams, also known as Business Email Compromise (BEC), often start with an email in which attackers pose as someone the victim trusts. The message makes a seemingly legitimate business request that usually involves wire transfer or financial payment. These BEC scams prey on human nature and have successfully caused organizations more than $26B of financial losses since 2016.

    Among various types of BEC attacks, supplier invoicing fraud often accounts for the biggest losses due to B2B payments. Unfortunately, most organizations don’t have visibility into the risk posed by their suppliers. So how can you better protect your company?

    Join this live demo to learn more about the following:

    - How does BEC work
    - Real-life examples of BEC attempts
    - How does Proofpoint address common BEC use cases and supplier fraud
  • Proofpoint December Insiders Meeting Recorded: Dec 17 2020 52 mins
    Proofpoint Security Awareness Product Management Team
    It’s our 2020 Proofpoint Security Awareness Training Year in Review! Everyone is welcomed to join to learn about all the great improvements we’ve made to our security awareness platform in 2020. Join us on Thursday, December 17 at 11:00 am ET/8:00 am PT for an interactive session with our Product Management team.

    Here are some of the areas we’ll highlight:

    - Automation & Usability: Improved administration and automation to let you do more with less including automated new-hire training, improved user management, and more
    - Business Intelligence: See how we're helping you report on key outcomes important to your organization with tools like automated reporting, Results API, and enhanced reports
    - Content: Dramatically increased variety and assortment of content including our acquisition of The Defence Works and partnership with TeachPrivacy
    - Content Delivery: More easily discover and tailor your content for users with our industry-leading Customization Center and new Content Library
    - Integrations: Leverage Proofpoint threat intelligence for better visibility into user-reported messages and new ways to address risk with our Targeted Attack Protection (TAP) integration

    Sign up for the webinar and see how we’ve been accelerating innovation in 2020 – and can’t wait for 2021!
  • Protecting Your Data Against the Insider Threat Risk Recorded: Dec 17 2020 30 mins
    Rob Bolton and Lee Duff Insider Threat Management specialists, Proofpoint
    As the workforce rapidly shifts to remote work, the complexity of protecting IP and sensitive data has grown exponentially. Old models of locking down the perimeter no longer apply. Instead, a modern, people-centric approach to Insider Threat Management can complement existing information protection programs, while providing greater visibility and context into both user behaviour and data movement.

    Join us in a 30-mins Live Talk with Proofpoint’s Rob Bolton and Lee Duff Insider Threat Management specialists as they discuss:

    - The types of insider threat profiles and how to address them. For example, organizations may not know how that more than 60% of insiders are negligent.
    - Why insider threats are unique and require context into both user and data activity. 
    - How to reduce response time by accelerating investigations. The longer the response times, the costlier an incident can get.
    - And more!
  • Zielscheibe Mitarbeiter: Wie sich BEC-Angriffe 2020 weiterentwickelt haben Recorded: Dec 17 2020 54 mins
    Markus Grüneberg, IT Security & Data Privacy Advisor bei Proofpoint
    Corona hat nicht nur Auswirkungen auf unser aller Leben, auch die Bedrohungslandschaft wurde durch das Virus stark beeinflusst. Das Proofpoint Threat Research Team hat in den letzten Monaten mehr und mehr zielgerichtete BEC (Business Email Compromise)- und EAC (Email Account Compromise)-Angriffe beobachtet, die mit der Angst vor Corona zu ködern versuchten.Nehmen Sie teil am Webinar mit Markus Grüneberg, IT Security & Data Privacy Advisor bei Proofpoint, wenn es um folgende Themen geht:

    Die aktuelle Bedrohungslandschaft
    Neue BEC Taktiken, die Lieferketten ins Visier nehmen
    Unterschiede zwischen BEC und anderen Taktiken wie Malware und Anmeldedaten Phishing
    Warum Cyberkriminelle sich für eine und nicht die andere Taktik entscheiden – ein psychologischer Exkurs.
  • Live Demo: CASB & the Power of Cross-Platform Integrations Recorded: Dec 16 2020 32 mins
    Dustin Hannifin, Cloud Security Solutions Architect at Proofpoint
    As a valued CASB customer, did you know that you can optimize your CASB solution for cloud threat protection and data security through integrations with the rest of the Proofpoint's platform?

    Join us live demo as our expert demonstrates the people-centric approach of these integrations. In this session we will cover:

    - Email and cloud threat correlation and Very Attacked People (VAP) policies enabled by integrations with Proofpoint Targeted Attack Protection
    - Adaptive access and data controls enabled by integration with Proofpoint Browser Isolation
    - DLP classification shared across email, cloud and endpoint and unified incident management as part of Proofpoint Enterprise DLP
  • Live Demo: Augment Security & Triaging with Browser Isolation Controls Recorded: Dec 16 2020 31 mins
    Proofpoint Product Marketing Team
    Whether a high risk user receives an email or a security analyst needs to triage a threat, isolating the clicks on URLs is imperative to the security of the organization. So how can you lower your attack surface and protect your people against advanced threats at the same time?

    Join us for this customer exclusive 30-minute live demo as our experts show you how our Browser Isolation integration augments Targeted Attack Protection (TAP) and Threat Response Auto-Pull (TRAP). This session will cover how to:

    - Protect your high-risk users with adaptive isolation controls
    - Streamline your abuse mailbox triaging speed
    - Utilize other feature releases in TRAP 5.4
  • Cost of Compliance - The $270B problem. Recorded: Dec 16 2020 64 mins
    Michael McGrath, Senior Director, Compliance and Digital Risk, Proofpoint
    Join four leading experts as they discuss why the financial industry spends $270 billion per year on maintaining compliance. The European Union’s overhaul of data privacy regulation (GDPR) is estimated to have generated 114 million euros ($126 million) in fines over the past two years – a staggering 160,000 data breach notifications.

    These almost incomprehensible numbers, hide the challenges faced by every organisation in keeping up with changing regulations while maintaining reporting and customer service.

    Join us on as we discuss:
    - The factors driving compliance cost
    - How regulatory technology (Reg Tech) and modern-day data behaviour are evolving through 2020

    Controlling costs is critical: Every penny saved in compliance costs is another added to the bottom line. We anticipate this panel discussion will be a rewarding and profitable event to attend.

    The talk is led by Michael McGrath, Senior Director for Compliance and Digital Risk at Proofpoint. He is joined by:
    Susannah Hammond, Senior Regulatory Intelligence Expert at Thomson Reuters.
    Dennis Sullivan, Vice President, Senior Compliance Officer at PIMCO.
    Paul Clulow-Phillips, Managing Director - Global Head of Markets Compliance and Global Head of Surveillance at Société Générale.
  • Security Awareness Gets Real: A New Paradigm for Running a Program Recorded: Dec 15 2020 40 mins
    Mike Bailey, Sr. Product Marketing Manager at Proofpoint & Jamie Nelson, Proofpoint Customer
    For years, security awareness has been based on hypotheticals. Who clicked on a simulated attack? Who scored what in training? How many people participated in the program? That’s helpful but doesn’t directly translate to real risk improvements. Learn how you can focus your security awareness program by getting visibility into what’s really happening in your environment.

    Join us for a webinar as we introduce the new integrations with Proofpoint's advanced email security and threat intelligence. We'll talk about:

    - How to protect users who are being targeted and engaging with known malicious content
    - What actions to take for users who are reporting real vs. non-malicious threats
    - What the strategy is for these cutting-edge integrations in the future
  • eSummit: Insider Threat, Data Loss Prevention & Everything In-Between Recorded: Dec 11 2020 53 mins
    Randy Raw, VP of Information Security at Veterans United Home Loans & Brian Reed, Insider Threat DLP Evangelist at Proofpoint
    Traditional DLP hasn’t lived up to its promises. That's because data loss begins with people - whether they are negligent, compromised by external actors, or malicious insiders. Today, data loss prevention (DLP) and insider risk are top of mind for companies with a distributed workforce and increasing reliance on technology. So how can you better protect your organization?

    Join our experts for a conversation on why organizations need to take a modern, people-centric approach that provides visibility and context into content, user behavior, and threat insights to mitigate this risk. In this webinar, you'll learn:

    - The importance understanding user risk profiles
    - How to better understand and respond to people-led data breaches
    - Real-world examples and best practices to improve your data and user security

    *All sessions are eligible for CPE credits with ISC(2). You must be an active member with ISC(2) to receive credit. To submit your credits, please visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Cybersecurity eSummit: Session 2 - A New Social Engineering Combo: Email & Cloud Recorded: Dec 11 2020 53 mins
    Yair Grindlinger, VP & GM of Information Protection & Roie Cohen-Duwek, Dir. of Security Reserach at Proofpoint
    Cyber criminals are increasingly blending both email and cloud vectors, whereby a single malicious email can lead to an infiltrated cloud account. Since 94% of data breaches start with attacks targeting people via email, organizations need a holistic approach and solution to combine security efforts across all channels. So how is this achieved?

    Join our experts as they expose how attackers use cloud services, like Microsoft SharePoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC/EAC attack. In this session we’ll cover:

    - Trends and modern threat landscape
    - Case studies on how threat actors leverage legitimate cloud services to launch attacks
    - How to address these sophisticated hybrid attacks

    *All sessions are eligible for CPE credits with ISC(2). You must be an active member with ISC(2) to receive credit. To submit your credits, please visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Hindsight 20/20 & Cybersecurity trends for 2021
  • Live at: Jan 15 2021 9:15 am
  • Presented by: Martin MacKay, Andy Rose, Loïc Guézo, Markus Grüneberg, EMEA Leadership, Proofpoint
  • From:
Your email has been sent.
or close