Hi [[ session.user.profile.firstName ]]

Why integrated email security is vital to cyber risk reduction

Email, social media, and mobile devices are the tools of your trade - and for cyber criminals, the tools of attack.

Email is the number one threat vector. Social actions such as phishing and email scams arrived via email 96% of the time, and these security threats are always evolving. Having a holistic and integrated platform-based approach to solve email security has never been more critical and should be a top item in any companies’ priority list.

Join us as we discuss why an integrated, people-centric approach to email security is so vital in reducing cyber risk.
In this session, we will showcase how Proofpoint’s Threat Protection platform can integrate into your existing messaging and security environment to solve all email borne threats:

Blocking Malware/Non-Malware threats including Credential Phishing
Protection against Business Email Compromise (BEC) including visibility into Supplier Risk
Automated Remediation including Integration with your existing threat response workflow
Visibility into your most attacked people and recommendations to add adaptive controls, among other topics
Recorded Aug 11 2021 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rich Davies, International Cybersecurity Strategist & Andrew Livens, Cybersecurity Engineer, Proofpoint EMEA
Presentation preview: Why integrated email security is vital to cyber risk reduction

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • MOVING COMPLIANCE TO THE CLOUD: Lessons learnt from leading organisations Oct 5 2021 9:00 am UTC 43 mins
    Richard Davis, Cybersecurity Strategist & Ben Chapman, Compliance and e-Discovery Expert at Proofpoint, EMEA
    Migrating to a cloud archiving solution presents unique challenges and exceptional opportunities. With the overwhelming number of vendors, solutions and processes to choose from – where do you begin to select what works for your unique organisational requirements?

    This live talk will cover real-life stories and helpful tips on how some of the world’s leading organisations completed successful migration projects and the lessons learnt along the way. From global retailers to boutique financial services organisations, there are business opportunities to be unlocked for everyone.

    In this live 30-minute session, you will also learn:​

    How to avoid a compliance or e-discovery nightmare​
    Best practices and tools to ensure a smooth migration/li>
    How to look for additional business value
    Attendees will receive a copy of Proofpoint’s Step-by-Step Migration Guide
  • MOVING COMPLIANCE TO THE CLOUD: Key Steps to Avoid e-Discovery Nightmares! Sep 24 2021 9:00 am UTC 38 mins
    Michael Mcgrath, Compliance and Digital Risk Director & Richard Davis, International Cybersecurity Strategist, Proofpoint
    Moving Compliance to The Cloud?

    According to some estimates, 90% of the world’s total data volume was created in the last two years. That’s roughly 2.5 quintillion (2,500,000,000,000,000,000) bytes of data that are created every day, and it’s an estimated 1.7 megabytes per second per every person on the planet.

    It’s clear that we’re dealing with more data—and more types of data—than ever. Organisations are generating more data—and more kinds of data—every day. Managing it in a way that is compliant, cost effective and efficient has never been more complicated.

    You need a migration plan and we can help.

    Join us in a live 30-minute session where we discuss how your organisation can avoid compliance and e-discovery nightmares when migrating from legacy systems.

    In this session, you will learn:

    - The ongoing challenges of using legacy on-prem archiving technology
    - How to avoid a compliance or e-discovery nightmare
    - Best practices and tools to ensure a smooth migration

    And there's more... Attendees will receive a copy of Proofpoint’s Migration Guide.
  • Old Tricks, New Threat Actors: A Look Into H1 2021 Threat Landscape Sep 21 2021 8:00 am UTC 33 mins
    Davide Canali, Staff Threat Analyst, EMEA, Proofpoint
    A look back at the top threats within the first half of 2021. Learn about the latest cyberattacks and how to block them before they enter your organisations.

    30 minute live session on:

    - The rapid rise of ransomware, often present as 2nd-stage payload.
    - Why Phishing is the #1 threat by volume, and the variety of tactics used by cybercriminals
    - What analysis of the different threat actors and cybercriminal organisations have been up to in the last 6 months.
  • How to Build a Detection & Response Strategy for Insider Threats Recorded: Sep 16 2021 31 mins
    Sai Chavali, Sr. Product Marketing Manager & Jeremy Whitkop, Sr. Director of Technology Services at Proofpoint
    It’s common for organizations to spend time investigating external cyber threats, including understanding the motivations, intent and capabilities of attackers. But this level of effort is rarely employed when it comes to internal threats. Insider threats are a significant and underinvested problem, and it is crucial for organizations to adopt a people-centric approach to cybersecurity to better protect their data.

    Join us for a 30-minute webinar on Insider Threat Management (ITM) programs. Our Proofpoint experts will deep dive into customer case studies and explore how companies built successful ITM programs with governance and incident response processes, collaboration across teams, and strong detection and prevention technology.

    You will learn:

    - The primary types of insider threats: negligent, malicious or compromised users
    - Why a people-centric, comprehensive and cloud-native technology approach is crucial
    - Customers strategies for building successful people-centric ITM programs
    - Where managed services can help you build the right processes and augment your security teams
  • How Technology Can Drive Cultural Change in Today’s ‘New HQ’ Recorded: Sep 16 2021 60 mins
    Andrew Rose, Resident CISO, EMEA; Michael Bailey, Senior Product Marketing Manager, Proofpoint; Brandon Dunlap, Moderator
    Culture is an intrinsic part of what makes us human – it encompasses the social behaviour and norms found in human societies and their individuals. And, in an ‘always on’ digital society, that can only mean one thing – We Click! We click to open potentially malicious emails, infected files. We click to share information and then we click to share a bit more – all in a simple click of a button. On September 16, 2021 at 1:00 p.m. BST, join Proofpoint and (ISC)2 as we explore how cultures are formed and influenced by digital, social media, and what role technology has to play in allowing organisations to drive security awareness and cultural change in today’s ‘NEW HQ’.
  • How to Detect & Stop Email Fraud in Your Supply Chain​ Recorded: Sep 15 2021 46 mins
    Matt Cooke, CyberSecurity Specialist, Proofpoint
    Most companies depend on a variety of external vendors and partners to support their business. These interdependent relationships form a multi-faceted third-party ecosystem called the supply chain. Because of its complexity, the supply chain is an attractive target for cybercriminals.

    Where a scam targets the supply chain, the organisation will suffer substantial losses, both in time and money, in particular the subsequent costs to resolve the problem and repair the damage. Supply chain fraud attacks leverage both impersonation through Business Email Compromise (BEC) and Email Account Compromise (EAC). Has your organisation assessed the cybersecurity risks from your supply chain? How can you better protect your company?

    In this 30-mns insightful session, you will learn:

    - Real-world supply chain fraud examples
    - Grading risk in your suppliers
    - How to detect threats, including payroll diversion and supplier invoicing fraud
    - How to stop these multi-million-dollar email fraud attack
  • How to Implement People-Centric DLP for Office 365 Recorded: Sep 14 2021 36 mins
    Itir Clarke, Product Marketing Manager for Cloud Security at Proofpoint
    While Microsoft Office 365 is a cloud platform with powerful tools for office applications, messaging, file sharing and cloud storage, the platform still has major challenges around data security and compliance. This is why organizations need a complete solution that allows them to detect, investigate and defend against cybercriminals accessing sensitive data and trusted accounts.

    Join us for a 30-minute webinar on how companies can address these cybersecurity concerns with a comprehensive Data Loss Prevention (DLP) solution. In this session you'll learn:

    - The three primary data loss scenarios unique to Office 365
    - How Proofpoint Cloud App Security Broker (CASB) can help protect your information
    - The DLP best practices for Office 365 protection
  • Avoiding a Litigation Readiness Nightmare Recorded: Sep 14 2021 30 mins
    Shawn Aquino, Sr. Product Marketing Manager for Archiving at Proofpoint
    Recent ESG research predicts an increase in e-discovery requests in the immediate future, which means it’s time for companies to rethink litigation readiness and supporting technology. The outdated solutions many organizations are currently using over may prove to be woefully inadequate today, exposing organizations to increased risk particularly as they look to emerge from the global pandemic.

    Attend this 30-minute webinar to learn what trends are driving the need for better solutions and what you should expect from your e-discovery technology provider. In this session we'll discuss:

    - How built-in features should address virtually all your basic e-discovery requirements
    - What advanced capabilities can help you streamline your workflows and reduce costs
    - How some companies have adopted modern, cloud-native solutions to achieve greater efficiencies
  • Five Archiving & Compliance Rules for O365 Email, Teams, Zoom or Slack in 2021 Recorded: Sep 9 2021 50 mins
    Michael McGrath, Graham Ashworth & Richard Davis, Proofpoint EMEA
    Collaborative technology came of age in 2020, with rapid adoption and overarching reliance on Zoom, Teams, Slack and/or Skype. Beyond the humble email, these have all become crucial tools for business activity.

    2021 will be no different and these collaboration tools are here to stay. This opens up a series of new challenges for organisations, as existing supervision and e-discovery capabilities need to be extended to these platforms, to ensure compliance with all current international legislation.

    So whether you are wondering how do you archive all comms including email in 2021, have challenges in accessing that archive quickly and efficiently or still unsure if you are meeting all compliance requirements, this session is just what you need…

    Join us in this live discussion with leading Archiving and Compliance experts as they dive deeper into:

    The use of Outlook 365 archive and when does this need to be augmented.
    What to consider when reappraising content & comms compliance.
    What do you need to future proof existing archiving and compliance systems for the demands of tomorrow.
  • Human Error & Cybersecurity: Myths & Scams Debunked Featuring Forrester Research Recorded: Sep 7 2021 56 mins
    Jinan Budge of Forrester Research & Karen Letain of Proofpoint
    It’s human nature to make mistakes, but security teams must be careful not to respond to cybersecurity mistakes with negative reinforcement. Security awareness programs that promote a supportive environment are much more effective at raising ongoing awareness of safe cybersecurity practices.

    Join us for a 60-minute fireside chat with Proofpoint's Karen Letain, VP of Product Management, and guest speaker from Forrester Research Jinan Budge, Principal Analyst. In this session our experts will discuss how to effectively deal with the challenge of human error in cybersecurity.

    In this session we will explore:

    - The impacts of negative reinforcement for cybersecurity mistakes
    - How a supportive environment amplifies users’ readiness and reduces risk
    - An agile and sustainable framework for user knowledge and readiness
  • Cloud Originated Ransomware Attacks Recorded: Sep 7 2021 41 mins
    Ed Rowley, Director & Dan Marley-Cook, Technical Manager
    Ransomware is an old threat that persists as a modern-day problem. This type of malware – which gets name from the payment it demands after locking away or threatening to expose victims' files – is a major issue for any organisation that relies on IT. And as organisations move into the cloud, Ransomware is becoming one of today’s most disruptive types of cyberattacks, putting victims out of business, forcing hospitals to turn away patients, and bringing entire city governments to a standstill.

    Join us in this webinar, as Proofpoint cybersecurity experts dissect how cloud originated ransomware attacks have become a proven money maker for cybercriminals and how you can better protect your company’s cloud environment.

    In this 30-mns insightful session, you will learn:

    - How to protect against the new wave of Malicious Integrated Apps.
    - How to detect ransomware and malware using augmented security in addition to native O365 security.
    - Deep dive into new variant Employer 21 Ransomware, QBot malware, & Remcos RAT infestation.
  • 3 Ingredients for Successfully Deploying Social Media Channels Recorded: Sep 2 2021 44 mins
    Shane Sauer, Proofpoint, Davis Riar, Hootsuite, Scott Rogerson, UpContent
    The world has gone digital in the wake of the pandemic, and social media has become a critical communication channel for businesses. To get the right results and protect your business from risk, you need to do more than just unleash your employees.

    In this webinar, experts from Proofpoint, Hootsuite, and Upcontent discuss how to successfully enable your employees to represent your business on social media channels: content curation, social reach, and compliance. Our speakers cover strategies for:

    - Curating content that will resonate with your audience
    - Boosting your social reach with a robust employee advocacy program
    - Ensuring employee activity complies with regulations and corporate governance policies
  • How to Build a Modern DLP Program with CASB Recorded: Aug 31 2021 34 mins
    Itir Clarke, Sr. Product Marketing Manager and Jeremy Wittkop, Director of Technology Services at Proofpoint
    Data loss prevention (DLP) programs are made challenging by stricter compliance requirements, an evolving threat landscape, and adoption of cloud services and remote work practices. When building a successful DLP program, you need to consider many factors besides the DLP technology. Security and risk management professionals must address how to get the business side involved, what data to protect, how to measure success and more.

    Join us for a 30-minute webinar to learn latest on data security in healthcare. Our experts will cover:

    - What factors to consider when building a people-centric DLP program
    - Who to involve from outside the security team
    - How modern DLP technologies such as CASB improve your security posture
    - How to measure success
  • Redefining Modern Data Loss Prevention (DLP) Recorded: Aug 26 2021 56 mins
    John Checco,Resident CISO,Financial Services,Proofpoint; JJ Thompson; Michael Weisberg,CISO,Garnet River; Brandon Dunlap,Mod
    For decades, perimeter-based security was the starting point for cybersecurity programs. But in today’s environment of cloud-based, mobile and remote work, that perimeter has all but dissolved. Insider risk and data loss prevention (DLP) are a top concern for organizations with a distributed workforce and increasing reliance on technology. Join Proofpoint and (ISC)2 on August 26, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we explore how legacy approaches to information protection by building walls around critical data fails in today’s always-connected all-remote world. We’ll also discuss:

    · Shortcomings (perhaps some horror stories) of legacy DLP approaches

    · Actionable recommendations for protecting information in a borderless ecosystem

    · Redefining your DLP strategy to amplify people and data protection through CASB, ITM, Social Media Content Capture, et al.
  • Cost of Phishing Report - A Deep Dive into the Latest Trends Recorded: Aug 25 2021 30 mins
    Larry Ponemon, Chairman at Ponemon Research Institute & Mike Bailey, Sr. Product Marketing Manager at Proofpoint
    Threats like phishing are evolving rapidly. Not only are the volume of phishing attacks increasing, but these threats are also becoming more targeted and costly. So how can you better protect your organization?

    Join us for a 30-minute webinar on the findings of our annual The Cost of Phishing report. Our experts will deep dive into why expenses are skyrocketing for these attacks and how you can stop them in your organization.

    In this session, we will discuss:

    - The latest data, trends and insights for the phishing threat landscape
    - People-centric strategies to reduce costs associated with phishing
    - How tactics like security awareness and automation can reduce risk
  • 2021 Human Factor - Why People are Targets Recorded: Aug 25 2021 45 mins
    Daniel Blackford, Sr. Threat Researcher at Proofpoint
    Our premier annual report, The Human Factor, is the culmination of a year’s worth of threat research and insights drawn from more than 2.2 billion email messages, 35 billion URLs, 200 million attachments and 35 million cloud accounts. We have analyzed these trillions of data points to provide key insight into the current cybersecurity threat landscape.

    Join our threat expert for a special 45-minute webinar where he'll examine key findings from the new report. In this session, you will learn about:

    - The latest techniques and tactics used in attack campaigns—and why they work
    - The characteristics that make users vulnerable and lucrative targets
    - How threat actors pivoted to leverage COVID-19 themes
    How ransomware activity has evolved

    *This session is eligible for CPE credits with ISC(2).
  • Security Awareness Excellence: The Tip of the Iceberg Recorded: Aug 25 2021 54 mins
    Mike Bailey Senior PMM, Security Awareness & Brian Reed, Cybersecurity Strategy, Proofpoint
    You’ve sent out the phishing simulations. Assigned the appropriate training. Worked hard to get the word out about your program. Is it enough? Or just the tip of the iceberg?

    With security awareness, what you don’t know can hurt you. If you don’t know which users are being targeted by attackers, how can you protect them? If you don’t know users who are “click happy” with real malicious messages, how can you reduce your risk?

    Join us for a paradigm-shifting conversation on how “new-school” security awareness isn’t enough to address real people-centric risk.

    We’ll cover:

    - Ensuring a laser-focused approach to maximize your risk reduction
    - How metrics like click rate and reporting rate factor into your program
    - Engaging users to make them part of the IT security team
  • Critical Considerations for Slack and Teams Initiatives Recorded: Aug 24 2021 38 mins
    Shannon Smith, Archiving Sales Specialist, Proofpoint, Frank Beck, Senior Sales Engineer
    Employees depend on digital communication tools to collaborate more than ever before. Chat and collaboration apps have made it possible for employees to communicate with ease, but they can also put organisations at risk. As they adopt new communication tools, companies need to ensure that security, compliance, and legal requirements are considered and adequately addressed.

    Watch this webinar where we discuss critical considerations for a successful collaboration initiative. You’ll learn about:

    - Importance of a fit analysis
    - Engaging the right players
    - Security considerations
    - Legal and compliance concerns
  • Is Microsoft 365 the attackers new playground? Recorded: Aug 19 2021 40 mins
    Matt Cooke & Brandon Warren, Cybersecurity Specialists, Proofpoint
    Driven by Microsoft 365, digital transformation is remaking every aspect of modern business. Many organisations are moving to a 'cloud first' model, but security is often not invited to the table early enough.

    As businesses move to the cloud, particularly SaaS applications like Microsoft 365, there is a sense of loss of control - control of data and of the protection against the threats targeting users. Bad actors continue to target end users with advanced threats that can slip through gaps in your security infrastructure.

    Join us as we discuss how to leverage next-generation protection to ensure security for your employees on Microsoft 365.

    In this 30-minute session, we will examine:

    How you can get visibility into all threats targeting your organization
    Which threats that are evading your current defences
    How best to block threats before they hit your employee’s inboxes
    How businesses have adopted a people-centric security model to communicate and reduce risk
  • Live Demo: How Endpoint Content Scanning Can Protect Your Data Recorded: Aug 18 2021 32 mins
    Sai Chavali, Sr. Product Marketing Manager & Nirav Shah, Staff Product Manager of Insider Threats at Proofpoint
    Security teams need to know when sensitive data is most at risk while in motion. Yet many organizations are forced to limit endpoint-based content scanning because legacy endpoint data loss prevention (DLP) solutions create performance issues. In fact, legacy DLP solutions often force teams to decide between security and user experience. So how can you better protect your data in your organization?

    Join our live demo as our experts deep dive into Proofpoint's lightweight Endpoint DLP. We'll show you how to:

    - Detect sensitive and regulated data (such as social security, driver license, bank account and credit card numbers among others)
    - Gain visibility into high-risk users interacting with your sensitive content (such as departing employees, HR watchlists, high-risk locations)
    - Protect from data leakage risks and mitigate insider threats, whether compromised, malicious or negligent users
    - How to meet regulatory requirements (PCI, HIPAA, SWIFT, GDPR etc) without impacting user performance
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why integrated email security is vital to cyber risk reduction
  • Live at: Aug 11 2021 10:00 am
  • Presented by: Rich Davies, International Cybersecurity Strategist & Andrew Livens, Cybersecurity Engineer, Proofpoint EMEA
  • From:
Your email has been sent.
or close