Hi [[ session.user.profile.firstName ]]

Live Demo: Identify High-Risk Users & Protect Your Organization

Not all users are alike. Some will pose a higher risk to your organization than others. Managing insider threats starts with deciding which of your users pose the biggest risk – whether they’re employees, privileged users, contractors, third parties or supply chain partners.

Watch our live demo to learn how to build a practical, technology-enabled insider threat management program to protect your data.

In this 30-minute live demo, you will learn:

- How to recognize high risk users with common use cases
- Why context into user activity and data movement is key to identifying insider threats
- Practical security tips to protect your organization from the loss of critical data and IP
Recorded Mar 25 2021 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sai Chavali, Sr. Product Marketing Manager, Proofpoint, Tony Kubinksi, Sr. Sales Engineer, Proofpoint
Presentation preview: Live Demo: Identify High-Risk Users & Protect Your Organization

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Warum ältere Sicherheitstools keine Chance bei Insider-Bedrohungen haben Jun 24 2021 8:00 am UTC 60 mins
    Markus Pauly & Julian Maaus, Cybersecurity Engineer, Proofpoint DACH
    Legacy DLP-Lösungen blieben hinter den Erwartungen zurück; eine neue Generation an Lösungen verspricht jetzt Abhilfe.

    Daten verlieren sich nicht von selbst. Denn oftmals entstehen Sicherheitslücken und Datenverlust erst durch fahrlässiges oder sogar böswilliges Verhalten von Mitarbeitern. Dies gilt heute mehr denn je, da mehr Mitarbeiter im Home-Office arbeiten und die digitale Abhängigkeit zunimmt. Fakt ist, heute ist der Mensch der Perimeter des Unternehmens und jeglicher Schutz von Daten und Informationen muss beim Menschen ansetzen, um effektiv zu sein.

    Wie lässt sich das Insider Risiko also beherrschen?

    In unserem Webinar stellen wir Ihnen einen Ansatz vor, der Transparenz bietet und den Kontext von Handlungen in die Risikobewertung mit einbezieht. Dadurch kann die Gefahr eines Datenverlusts abgewehrt werden, noch bevor sich daraus ein teurer Zwischenfall entwickelt.

    Folgende Inhalte erwarten Sie:

    - Erläuterung von Insider-Bedrohungen und deren Konsequenzen auf das Risiko von Datenverlust
    - Abwägung zwischen der Abwendung von Bedrohungen (Prevention) und deren Erkennung bzw. Reaktion auf Zwischenfälle (Detection + Response)
    - Tipps aus der Praxis anhand von Beispielen
    - Live Demo
  • Four Best Practices to Combat Insider Threats in Your Supply Chain Jun 16 2021 9:00 am UTC 45 mins
    Rob Bolton, Senior Director, Information Protection, Proofpoint EMEA
    Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches.

    Safeguarding your organisation's IP and user data relies upon a people-centric approach to managing insider risk.
    Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches.

    Safeguarding your organisations’ IP and user data relies upon a people-centric approach to managing insider risk.

    Join us as we discuss how the technology sector and others in agile, collaborative industries can manage insider threats. In this session, you will learn how to:

    - Allow for open collaboration by using data to identify user risk
    - Protect your competitive advantage with real-time IP data tracking
    - Safeguard user data when working with third parties to remain compliant
    - Prepare your incident response plan to avoid unnecessary data loss
  • Machine Learning: Using NexusAI to Enable Regulatory Compliance Recorded: Jun 3 2021 31 mins
    Rick Dales, VP of Product Management, Dan Rapp, VP of Engineering & Data Science at Proofpoint
    False positives are the bane of any team reviewing digital communications to help enable regulatory compliance. They’re flagged as potential risks, so teams must spend countless hours manually reviewing and removing them from their queues. There is a better way.

    Proofpoint NexusAI for Compliance provides out-of-box machine learning models that utilize past reviewer decisions to significantly reduce low-value supervision content. This allows you to focus on meaningful content, while reducing reviewer fatigue and human errors caused by fatigue.

    Join us for a 30-minute webinar for a deep dive into this new technology. Our experts will:

    - Discuss how AI/ML technology can help enable regulatory compliance
    - Illustrate how you can remove up to 65% of false positives compared with legacy systems without machine learning
    - Demonstrate integration with Proofpoint Intelligent Supervision, offering next generation surveillance
  • Live Demo: Defending Against Email Fraud with Proofpoint Threat Protection Recorded: May 27 2021 33 mins
    Brett Shaw, Senior Product Marketing Manager, Proofpoint, Inc., Victor Soares, Group Product Manager, Proodpoint, Inc.
    Email fraud is rife. In fact, the FBI reported that email fraud attacks accounted for nearly $1.9 billion losses in 2020. These attacks are very difficult to detect, not only because they don’t contain payloads, but because they can appear to come from trusted sources, like a C-level executive or even a hijacked supplier account. So how can you better protect your organization?

    Watch our live demo on how you can defend against and identify email fraud with Proofpoint’s Threat Protection Platform.

    We cover:

    - The different tactics threat actors use to target your users with BEC attacks
    - Best practices to prevent attacks and identify who is being targeted
    - How Proofpoint helps mitigate risk, provide visibility and drive operational efficiency
  • May Insiders Meeting Panel: Getting Buy-In for Your Security Awareness Program Recorded: May 26 2021 50 mins
    Mike Bailey, Sr. Product Marketing Manager at Proofpoint and Customer Panelists
    We are trying something new with Insiders Meetings. We know you love hearing from your peers at Wisdom every year but want more engagement with them outside of our once-a-year user conference.

    Based on your feedback, we're kicking off a new 1-hour panel format where you'll be able to hear from your peers, ask questions, and make new connections. Our theme in May will be “Springing into Action: Get Buy-In for your Security Awareness Program”.
  • Protecting Healthcare’s Supply Chain Recorded: May 21 2021 57 mins
    Peter Rucys, Tampa General Hospital, Rob Holmes, Email Fraud Defense, Ryan Witt, Proofpoint Healthcare Customer Advisory
    In a recent survey, Proofpoint found that the average healthcare organization received about 200,000 emails from over 10,000 different domains, including those belonging to research organizations, construction companies, grantors and foundations and insurers, as well as classic supply chain participants. Of these clients, 98% received some email-based threat and 97% received threats from at least one of their suppliers’ domains via impersonation or business email compromise. One trend stands out: today’s attacks target people, not just infrastructure. The sheer volume and value of business conducted by email is a noteworthy reason to focus on protecting your supply chain. In this session, we’ll discuss the most critical issues impacting healthcare IT and Security leaders today.
    We’ll share:
    • A view into the current threat landscape
    • The unique risks of the supply chain to patient safety
    • Security considerations and transformations for 2021
  • Targeted Behavior Change for Security Awareness Training Recorded: May 20 2021 31 mins
    Robert Shields, Sr. Product Marketing Manager & Susan Mackowiak, Sr. Director of Content at Proofpoint
    Behavior change is the ultimate goal for security awareness training. To be successful at mitigating threats, organizations need to implement a targeted, agile security awareness training program that considers today’s threat landscape as well as the diversity of their workers’ roles and knowledge. By accommodating roles, competencies and threats, companies can accelerate behavior change to build a strong security culture. So how can you achieve this?

    Join us for a 30-minute webinar as our experts discuss how to build an effective security awareness training program and culture.

    In this session we will explore:

    - A new framework to guide content creation
    - The curation of content that addresses your threats, risks and compliance needs
    - Personalized learning paths you can leverage to change behavior and enable culture change
  • Critical Considerations for Slack and Teams Initiatives Recorded: May 19 2021 38 mins
    Shannon Smith, Archiving Sales Specialist, Proofpoint, Frank Beck, Senior Sales Engineer
    Employees depend on digital communication tools to collaborate more than ever before. Chat and collaboration apps have made it possible for employees to communicate with ease, but they can also put organizations at risk. As they adopt new communication tools, companies need to ensure that security, compliance, and legal requirements are considered and adequately addressed.

    Watch this webinar where we discuss critical considerations for a successful collaboration initiative. You’ll learn about:

    - Importance of a fit analysis
    - Engaging the right players
    - Security considerations
    - Legal and compliance concerns
  • Seeing the Attacker’s View: A People-Centric Approach to Security Discussion Recorded: May 18 2021 48 mins
    Richard Davis, Cyber Security Strategist, Proofpoint & Dominic Trott, UK Product Manager, Orange Cyberdefense
    It’s no secret that modern attackers have pivoted to targeting people, largely via simple phishing emails. A simple internet search can tell them all they need to know about who has access to the system or data they are targeting.

    You likely know that email fraud, or BEC, is costing organizations billions of dollars. But do you know why these attacks continue to reach new levels of success?

    Join this session as we discuss how you can identify your most attacked and riskiest users, understand how they are being attacked and design better strategies and protections to prevent these attacks being successful and minimise your cybersecurity risk.
  • 4 Strategies to Combat Insider Threats in Your Supply Chain Recorded: May 12 2021 31 mins
    Sai Chavali, Sr. Product Marketing Manager, Proofpoint
    Collaboration is key in today’s workplace. However, broadening the supply chain to include remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. To safeguard your critical IP and sensitive data, organizations need to take a people-centric approach to protect their data and mitigate insider risk.

    Watch our 30-minute webinar to learn about how the technology sector and others in agile, collaborative industries can manage insider threats. In this webinar, we’ll cover the four strategies on how to:

    ● Allow for open collaboration by using data to identify user risk
    ● Protect your competitive advantage with real-time IP data tracking
    ● Safeguard user data when working with third parties across your supply chain to remain compliant
    ● Prepare your incident response plan to avoid unnecessary data loss
  • Email Fraud - 2020 FBI Report & What You Should Know Recorded: May 11 2021 32 mins
    Sara Pan, Sr. Product Marketing Manager, Proofpoint
    According to the 2020 FBI Internet Crime Report, attackers have shifted their email fraud tactics away from hacking the email accounts of C-levels to compromising vendor emails. The report also reveals that email fraud accounts for 44% of all reported losses in 2020. While these attacks are low volume, they represent huge dollar losses and are constantly evolving. So how can you better protect your company?

    Watch our 30-minute webinar for a deep dive into the FBI insights of email fraud and the best practices of combating it. In this session, we'll cover:

    · What email fraud variants the FBI report has called out
    · How attackers leverage impersonation and compromised accounts jointly in an attack
    · What security controls and framework you can adopt to better defend against email fraud
  • How to Navigate Insider Risk: Top Tips from Gartner's Market Guide Recorded: May 11 2021 32 mins
    Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, Proofpoint
    Insider threats may initially appear to be just like any other threat, but the big difference is that insiders are in a position of trust. So how do you deal with these malicious or accidental threats that come from people within the organisation?

    Watch Proofpoint’s experts Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, as they discuss the top tips from Gartner’s new report on Market Guide for Insider Risk Management Solutions. You will learn:

    - The “Rule of Three” for insider threats (including threat types, threat activities, and mitigation goals)
    - How to employ an insider threat mitigation program comprising people, processes, and technology
    - Considerations when purchasing insider risk management technology

    Discover what you need to know about insider threats, how to protect your organisation and navigate these risks.
  • Live Demo: Identify, Report & Prevent Phishing with Security Awareness Training Recorded: May 6 2021 29 mins
    Kevin Rohm, Account Executive, Proofpoint, Inc.
    99% of the phishing attacks require human interaction to succeed, potentially exposing your organization to email fraud, ransomware, data loss and breaches.

    Educate your users and reduce your phishing risk through Proofpoint’s industry-leading security awareness solution. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Watch our 30-minute live demo to learn how to:

    - Prepare users for new attacks by leveraging threat intelligence to continuously understand which people and what threats are targeting your organization
    - Assess your users’ susceptibility to phishing attacks and social engineering
    - Drive behavior change by turning your users into security assets with engaging, relevant and entertaining training
  • The Cost of Cloud Compromise and Shadow IT Recorded: May 5 2021 61 mins
    Larry Ponemon, Ponemon Institute and Itir Clarke, Proofpoint
    With the increased use of SaaS applications, cloud account takeover and Shadow IT present an increasing security risk to organizations. As the network perimeter is replaced by a user-defined security perimeter, it becomes critical to evaluate access controls, threat detection and data security in the cloud. So how can you better protect your company?

    Join us for this special webinar with experts from Proofpoint and Ponemon Institute. They will discuss the findings of the newly conducted research among IT and security professionals to determine the risk and cost of cloud account takeovers and Shadow IT.
    In this session, we’ll cover:
    • The state of cloud usage in organizations
    • Security risks and practices to secure the cloud
    • Cloud compromises and the end user risk
    • The cost of compromised cloud accounts
  • Compliance & Risk Mitigation for Healthcare Recorded: May 4 2021 36 mins
    Ryan Witt, Healthcare Industry Practice Leader, Robert Kreuscher, Sr. Sales Engineer, Shannon Smith, Archive Sales Specialist
    Cloud-based applications like Microsoft 365 keep your healthcare organization operating, especially in today’s digital world. Yet securing data, adhering to data privacy and record keeping, while protecting against fraudulent activity, can be a significant challenge. Healthcare organizations need a people-centric approach to detecting risky behavior and litigation readiness.

    Watch our 30-minute panel discussion about how your peers are addressing these challenges and the steps you can take to ensure compliance across your electronic communications ecosystem. This session covers:

    - Common compliance challenges and pitfalls when it comes to e-discovery and risk detection, especially around Microsoft 365
    - How your capture and archive strategy can augment your information protection program
    - How Proofpoint’s people-centric approach to security and compliance helps better protect healthcare organizations
  • Security Leaders' Panel: Has Phishing Reached a Crisis Level? Recorded: Apr 29 2021 80 mins
    Lucia Milica, CISO, Proofpoint, Robbie Meitler, AVP, Liberty Mutual, Rebecca Harness, CISO, Saint Louis University
    Phishing and social engineering attacks continue to grow in frequency and sophistication. They challenge security leaders and practitioners who struggle to track and stop their elusive and persistent tactics. Given the magnitude of the challenge, many security leaders consider this their No. 1 priority for 2021.

    Join our customer and CISO panel to learn more about these threats and how security leaders are using intelligence, controls and their people to reduce the risk of breach and data loss.

    In this session, our experts will cover:

    -How phishing and social engineering attacks have increased
    -How organizations are being targeted
    -How your company culture affect risk
    -Options for you to better protect you company
  • Managing Insider Risk with a Hybrid Workforce - Featuring Forrester Research Recorded: Apr 27 2021 61 mins
    Brian Reed, Product Evangelist, Proofpoint, Inc., Joseph Blankenship, VP and Research Director for Security & Risk, Forrester
    After a year of remote work, we are beginning the return to “normalcy” in many places. So what happens as the workforce shifts to a hybrid model of partial in-person and partial remote work? How do you guard from external attacks and manage insider risks – whether accidental or malicious?

    Watch our special 1-hour webinar with guest speaker, Forrester Research’s Joseph Blankenship, VP and Research Director for Security & Risk, to discuss key insider threat factors with a remote and hybrid workforce.

    This webinar covers:

    · What the trend towards hybrid work means for organizations that are dependent on third-party users and supply chain vendors
    · How to share information in a way that protects against data loss
    · How to build a business case for an insider threat management program (ITMP)
  • In the Bullseye: Healthcare and Email Threat Vectors Recorded: Apr 27 2021 62 mins
    Ryan Witt, Proofpoint; John Carnes, Information Security Professional; Shelly Epps, Duke Health; Brandon Dunlap, Moderator
    Threat actors are targeting individuals in the Healthcare industry and using email as their main entry point for cyber attacks. These attacks are aimed at specific people in an organization to steal money, data or sensitive healthcare information. Threat actors can gain access to legitimate mailboxes using tactics such as phishing, malware or social engineering to impersonate the victim. This leads to further infiltration into an enterprise system. What can those in the healthcare industry do to combat this targeting by cyber criminals? Join Proofpoint and (ISC)2 on April 27th at 1 pm ET / 10 am PT for a panel discussion focusing on email compromise/account takeovers and best practices for dealing with these threats in healthcare.
  • How to Create a Risk-Based Data Privacy Program Recorded: Apr 23 2021 36 mins
    Itir Clarke, Senior Product Marketing Manager, Proofpoint, Inc., Lucia Milica, Global Resident CISO, Proofpoint, Inc.
    Data privacy regulations are growing more complex, and the penalties for noncompliance can be severe. Companies need a risk-based approach to PII protection across email, cloud apps and endpoint to prioritize and address compliance challenges in the cloud era. This requires visibility to data risk, but also people risk. So how can you achieve this?

    Watch our 30-minute webinar with Lucia Milică, Proofpoint Global Resident CISO, to learn how a people-centric approach to Information Protection can help you achieve a risk-adjusted privacy program:

    We cover how you can:

    - Discover which data and people pose greater PII compliance risks
    - Reduce risk by training and improving data traceability
    - Keep privacy data safe using people-centric controls and reporting
  • How to Defend Against Email Fraud from Compromised Suppliers Recorded: Apr 23 2021 32 mins
    Sara Pan, Sr. Product Marketing Manager, Proofpoint
    Email fraud schemes have evolved to include supplier account compromise. Based on Proofpoint’s internal research, 98% of monitored organizations have received threats from their suppliers— whether they’ve been spoofed or compromised. Unfortunately, most organizations lack visibility into which suppliers pose risk. So how can you better defend against threats from these risky suppliers?

    Watch our webinar for a deep dive into the best practices of combating supplier impersonation and account compromise. In this session, we'll cover:

    - Real-world supply chain fraud examples
    - Grading risk in your suppliers
    - How to detect threats, including payroll diversion and supplier invoicing fraud
    - A framework that helps you stop these multi-million-dollar email fraud attacks
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live Demo: Identify High-Risk Users & Protect Your Organization
  • Live at: Mar 25 2021 11:30 pm
  • Presented by: Sai Chavali, Sr. Product Marketing Manager, Proofpoint, Tony Kubinksi, Sr. Sales Engineer, Proofpoint
  • From:
Your email has been sent.
or close