Hi [[ session.user.profile.firstName ]]

Security Awareness Excellence: The Tip of the Iceberg

You’ve sent out the phishing simulations. Assigned the appropriate training. Worked hard to get the word out about your program. Is it enough? Or just the tip of the iceberg?

With security awareness, what you don’t know can hurt you. If you don’t know which users are being targeted by attackers, how can you protect them? If you don’t know users who are “click happy” with real malicious messages, how can you reduce your risk?

Join us for a paradigm-shifting conversation on how “new-school” security awareness isn’t enough to address real people-centric risk.

We’ll cover:

- Ensuring a laser-focused approach to maximize your risk reduction
- How metrics like click rate and reporting rate factor into your program
- Engaging users to make them part of the IT security team
Recorded Aug 25 2021 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Bailey Senior PMM, Security Awareness & Brian Reed, Cybersecurity Strategy, Proofpoint
Presentation preview: Security Awareness Excellence: The Tip of the Iceberg

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Always Aware: Continuing Your Cybersecurity Awareness Month Journey Oct 13 2021 5:00 pm UTC 60 mins
    Robert Shields and Susan Mackowiak
    - October is Cyber Security Awareness Month (CSAM). But one month is only the beginning, and lasting change takes consistent programs and nudges to cultivate a strong security awareness 365-days of the year.
    - Join ISSA and Proofpoint as they discuss how to leverage CSAM to kick-start continuous programs to transform users from targets to defenders. In this session, our experts will cover:
    - How to leverage monthly nudges and campaigns
    - Extensive opportunities available by seasonal challenges and ‘domain days’
    - How pre-packaged campaigns utilizing micro-learnings can make this a reality
  • THE HUMAN FACTOR REPORT 2021 FINDINGS Oct 13 2021 9:00 am UTC 56 mins
    Adenike Cosgrove & Matt Cooke, Cybersecurity Strategists, Proofpoint EMEA
    Cybersecurity, Ransomware and Email Fraud in a Year that Changed the World
    Every day, we analyse more than 2.2 billion email messages, 35 billion URLs, 200 million attachments, 35 million cloud accounts and trillions of data points in all across all the digital channels. The findings of a year’s worth of valuable threat research culminates in one of the largest and most diverse datasets in cybersecurity - yearly showcased in ‘The Human Factor Report’.

    Join us as we review the latest report findings, and examine the ways in which attacks have evolved to maximise their success rate, and the emerging technical and social attacker techniques that are highly effective at both engaging, and compromising, users.

    In this 45-minute session, we’ll share:

    Evolving trends in threat actor capability, techniques and efficacy, and their laser focus on the user
    Examples of recent attacks and lures, and how attackers leverage behavioural science to bypass security training
    Statistics that enable you to baseline your organisation against your peers
    Actionable insight on how to better protect your people against these threats
  • MOVING COMPLIANCE TO THE CLOUD: Lessons learnt from leading organisations Oct 5 2021 9:00 am UTC 43 mins
    Richard Davis, Cybersecurity Strategist & Ben Chapman, Compliance and e-Discovery Expert at Proofpoint, EMEA
    Migrating to a cloud archiving solution presents unique challenges and exceptional opportunities. With the overwhelming number of vendors, solutions and processes to choose from – where do you begin to select what works for your unique organisational requirements?

    This live talk will cover real-life stories and helpful tips on how some of the world’s leading organisations completed successful migration projects and the lessons learnt along the way. From global retailers to boutique financial services organisations, there are business opportunities to be unlocked for everyone.

    In this live 30-minute session, you will also learn:​

    How to avoid a compliance or e-discovery nightmare​
    Best practices and tools to ensure a smooth migration/li>
    How to look for additional business value
    Attendees will receive a copy of Proofpoint’s Step-by-Step Migration Guide
  • MOVING COMPLIANCE TO THE CLOUD: Key Steps to Avoid e-Discovery Nightmares! Recorded: Sep 24 2021 38 mins
    Michael Mcgrath, Compliance and Digital Risk Director & Richard Davis, International Cybersecurity Strategist, Proofpoint
    Moving Compliance to The Cloud?

    According to some estimates, 90% of the world’s total data volume was created in the last two years. That’s roughly 2.5 quintillion (2,500,000,000,000,000,000) bytes of data that are created every day, and it’s an estimated 1.7 megabytes per second per every person on the planet.

    It’s clear that we’re dealing with more data—and more types of data—than ever. Organisations are generating more data—and more kinds of data—every day. Managing it in a way that is compliant, cost effective and efficient has never been more complicated.

    You need a migration plan and we can help.

    Join us in a live 30-minute session where we discuss how your organisation can avoid compliance and e-discovery nightmares when migrating from legacy systems.

    In this session, you will learn:

    - The ongoing challenges of using legacy on-prem archiving technology
    - How to avoid a compliance or e-discovery nightmare
    - Best practices and tools to ensure a smooth migration

    And there's more... Attendees will receive a copy of Proofpoint’s Migration Guide.
  • Live Demo: Targeted Behavior Change for Security Awareness Training Recorded: Sep 23 2021 31 mins
    Karl Hart, Account Executive for Security Awareness at Proofpoint
    Behavior change is the ultimate goal for security awareness training. To be successful at mitigating threats, organizations need to implement a targeted, agile security awareness training program that considers today’s threat landscape as well as the diversity of their workers’ roles and knowledge. So how can you achieve this?

    Join us for a 30-minute live demo as our expert discusses how to build an effective security awareness training program and culture. In this session we will explore:

    • A new framework to guide content creation
    • The curation of content that addresses your threats, risks and compliance needs
    • Personalized learning paths you can leverage to change behavior and enable culture change
  • Old Tricks, New Threat Actors: A Look Into H1 2021 Threat Landscape Recorded: Sep 21 2021 33 mins
    Davide Canali, Staff Threat Analyst, EMEA, Proofpoint
    A look back at the top threats within the first half of 2021. Learn about the latest cyberattacks and how to block them before they enter your organisations.

    30 minute live session on:

    - The rapid rise of ransomware, often present as 2nd-stage payload.
    - Why Phishing is the #1 threat by volume, and the variety of tactics used by cybercriminals
    - What analysis of the different threat actors and cybercriminal organisations have been up to in the last 6 months.
  • How to Build a Detection & Response Strategy for Insider Threats Recorded: Sep 16 2021 31 mins
    Sai Chavali, Sr. Product Marketing Manager & Jeremy Whitkop, Sr. Director of Technology Services at Proofpoint
    It’s common for organizations to spend time investigating external cyber threats, including understanding the motivations, intent and capabilities of attackers. But this level of effort is rarely employed when it comes to internal threats. Insider threats are a significant and underinvested problem, and it is crucial for organizations to adopt a people-centric approach to cybersecurity to better protect their data.

    Join us for a 30-minute webinar on Insider Threat Management (ITM) programs. Our Proofpoint experts will deep dive into customer case studies and explore how companies built successful ITM programs with governance and incident response processes, collaboration across teams, and strong detection and prevention technology.

    You will learn:

    - The primary types of insider threats: negligent, malicious or compromised users
    - Why a people-centric, comprehensive and cloud-native technology approach is crucial
    - Customers strategies for building successful people-centric ITM programs
    - Where managed services can help you build the right processes and augment your security teams
  • How Technology Can Drive Cultural Change in Today’s ‘New HQ’ Recorded: Sep 16 2021 60 mins
    Andrew Rose, Resident CISO, EMEA; Michael Bailey, Senior Product Marketing Manager, Proofpoint; Brandon Dunlap, Moderator
    Culture is an intrinsic part of what makes us human – it encompasses the social behaviour and norms found in human societies and their individuals. And, in an ‘always on’ digital society, that can only mean one thing – We Click! We click to open potentially malicious emails, infected files. We click to share information and then we click to share a bit more – all in a simple click of a button. On September 16, 2021 at 1:00 p.m. BST, join Proofpoint and (ISC)2 as we explore how cultures are formed and influenced by digital, social media, and what role technology has to play in allowing organisations to drive security awareness and cultural change in today’s ‘NEW HQ’.
  • How to Detect & Stop Email Fraud in Your Supply Chain​ Recorded: Sep 15 2021 46 mins
    Matt Cooke, CyberSecurity Specialist, Proofpoint
    Most companies depend on a variety of external vendors and partners to support their business. These interdependent relationships form a multi-faceted third-party ecosystem called the supply chain. Because of its complexity, the supply chain is an attractive target for cybercriminals.

    Where a scam targets the supply chain, the organisation will suffer substantial losses, both in time and money, in particular the subsequent costs to resolve the problem and repair the damage. Supply chain fraud attacks leverage both impersonation through Business Email Compromise (BEC) and Email Account Compromise (EAC). Has your organisation assessed the cybersecurity risks from your supply chain? How can you better protect your company?

    In this 30-mns insightful session, you will learn:

    - Real-world supply chain fraud examples
    - Grading risk in your suppliers
    - How to detect threats, including payroll diversion and supplier invoicing fraud
    - How to stop these multi-million-dollar email fraud attack
  • How to Implement People-Centric DLP for Office 365 Recorded: Sep 14 2021 36 mins
    Itir Clarke, Product Marketing Manager for Cloud Security at Proofpoint
    While Microsoft Office 365 is a cloud platform with powerful tools for office applications, messaging, file sharing and cloud storage, the platform still has major challenges around data security and compliance. This is why organizations need a complete solution that allows them to detect, investigate and defend against cybercriminals accessing sensitive data and trusted accounts.

    Join us for a 30-minute webinar on how companies can address these cybersecurity concerns with a comprehensive Data Loss Prevention (DLP) solution. In this session you'll learn:

    - The three primary data loss scenarios unique to Office 365
    - How Proofpoint Cloud App Security Broker (CASB) can help protect your information
    - The DLP best practices for Office 365 protection
  • Avoiding a Litigation Readiness Nightmare Recorded: Sep 14 2021 30 mins
    Shawn Aquino, Sr. Product Marketing Manager for Archiving at Proofpoint
    Recent ESG research predicts an increase in e-discovery requests in the immediate future, which means it’s time for companies to rethink litigation readiness and supporting technology. The outdated solutions many organizations are currently using over may prove to be woefully inadequate today, exposing organizations to increased risk particularly as they look to emerge from the global pandemic.

    Attend this 30-minute webinar to learn what trends are driving the need for better solutions and what you should expect from your e-discovery technology provider. In this session we'll discuss:

    - How built-in features should address virtually all your basic e-discovery requirements
    - What advanced capabilities can help you streamline your workflows and reduce costs
    - How some companies have adopted modern, cloud-native solutions to achieve greater efficiencies
  • Five Archiving & Compliance Rules for O365 Email, Teams, Zoom or Slack in 2021 Recorded: Sep 9 2021 50 mins
    Michael McGrath, Graham Ashworth & Richard Davis, Proofpoint EMEA
    Collaborative technology came of age in 2020, with rapid adoption and overarching reliance on Zoom, Teams, Slack and/or Skype. Beyond the humble email, these have all become crucial tools for business activity.

    2021 will be no different and these collaboration tools are here to stay. This opens up a series of new challenges for organisations, as existing supervision and e-discovery capabilities need to be extended to these platforms, to ensure compliance with all current international legislation.

    So whether you are wondering how do you archive all comms including email in 2021, have challenges in accessing that archive quickly and efficiently or still unsure if you are meeting all compliance requirements, this session is just what you need…

    Join us in this live discussion with leading Archiving and Compliance experts as they dive deeper into:

    The use of Outlook 365 archive and when does this need to be augmented.
    What to consider when reappraising content & comms compliance.
    What do you need to future proof existing archiving and compliance systems for the demands of tomorrow.
  • Human Error & Cybersecurity: Myths & Scams Debunked Featuring Forrester Research Recorded: Sep 7 2021 56 mins
    Jinan Budge of Forrester Research & Karen Letain of Proofpoint
    It’s human nature to make mistakes, but security teams must be careful not to respond to cybersecurity mistakes with negative reinforcement. Security awareness programs that promote a supportive environment are much more effective at raising ongoing awareness of safe cybersecurity practices.

    Join us for a 60-minute fireside chat with Proofpoint's Karen Letain, VP of Product Management, and guest speaker from Forrester Research Jinan Budge, Principal Analyst. In this session our experts will discuss how to effectively deal with the challenge of human error in cybersecurity.

    In this session we will explore:

    - The impacts of negative reinforcement for cybersecurity mistakes
    - How a supportive environment amplifies users’ readiness and reduces risk
    - An agile and sustainable framework for user knowledge and readiness
  • Cloud Originated Ransomware Attacks Recorded: Sep 7 2021 41 mins
    Ed Rowley, Director & Dan Marley-Cook, Technical Manager
    Ransomware is an old threat that persists as a modern-day problem. This type of malware – which gets name from the payment it demands after locking away or threatening to expose victims' files – is a major issue for any organisation that relies on IT. And as organisations move into the cloud, Ransomware is becoming one of today’s most disruptive types of cyberattacks, putting victims out of business, forcing hospitals to turn away patients, and bringing entire city governments to a standstill.

    Join us in this webinar, as Proofpoint cybersecurity experts dissect how cloud originated ransomware attacks have become a proven money maker for cybercriminals and how you can better protect your company’s cloud environment.

    In this 30-mns insightful session, you will learn:

    - How to protect against the new wave of Malicious Integrated Apps.
    - How to detect ransomware and malware using augmented security in addition to native O365 security.
    - Deep dive into new variant Employer 21 Ransomware, QBot malware, & Remcos RAT infestation.
  • 3 Ingredients for Successfully Deploying Social Media Channels Recorded: Sep 2 2021 44 mins
    Shane Sauer, Proofpoint, Davis Riar, Hootsuite, Scott Rogerson, UpContent
    The world has gone digital in the wake of the pandemic, and social media has become a critical communication channel for businesses. To get the right results and protect your business from risk, you need to do more than just unleash your employees.

    In this webinar, experts from Proofpoint, Hootsuite, and Upcontent discuss how to successfully enable your employees to represent your business on social media channels: content curation, social reach, and compliance. Our speakers cover strategies for:

    - Curating content that will resonate with your audience
    - Boosting your social reach with a robust employee advocacy program
    - Ensuring employee activity complies with regulations and corporate governance policies
  • How to Build a Modern DLP Program with CASB Recorded: Aug 31 2021 34 mins
    Itir Clarke, Sr. Product Marketing Manager and Jeremy Wittkop, Director of Technology Services at Proofpoint
    Data loss prevention (DLP) programs are made challenging by stricter compliance requirements, an evolving threat landscape, and adoption of cloud services and remote work practices. When building a successful DLP program, you need to consider many factors besides the DLP technology. Security and risk management professionals must address how to get the business side involved, what data to protect, how to measure success and more.

    Join us for a 30-minute webinar to learn latest on data security in healthcare. Our experts will cover:

    - What factors to consider when building a people-centric DLP program
    - Who to involve from outside the security team
    - How modern DLP technologies such as CASB improve your security posture
    - How to measure success
  • Redefining Modern Data Loss Prevention (DLP) Recorded: Aug 26 2021 56 mins
    John Checco,Resident CISO,Financial Services,Proofpoint; JJ Thompson; Michael Weisberg,CISO,Garnet River; Brandon Dunlap,Mod
    For decades, perimeter-based security was the starting point for cybersecurity programs. But in today’s environment of cloud-based, mobile and remote work, that perimeter has all but dissolved. Insider risk and data loss prevention (DLP) are a top concern for organizations with a distributed workforce and increasing reliance on technology. Join Proofpoint and (ISC)2 on August 26, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we explore how legacy approaches to information protection by building walls around critical data fails in today’s always-connected all-remote world. We’ll also discuss:

    · Shortcomings (perhaps some horror stories) of legacy DLP approaches

    · Actionable recommendations for protecting information in a borderless ecosystem

    · Redefining your DLP strategy to amplify people and data protection through CASB, ITM, Social Media Content Capture, et al.
  • Cost of Phishing Report - A Deep Dive into the Latest Trends Recorded: Aug 25 2021 30 mins
    Larry Ponemon, Chairman at Ponemon Research Institute & Mike Bailey, Sr. Product Marketing Manager at Proofpoint
    Threats like phishing are evolving rapidly. Not only are the volume of phishing attacks increasing, but these threats are also becoming more targeted and costly. So how can you better protect your organization?

    Join us for a 30-minute webinar on the findings of our annual The Cost of Phishing report. Our experts will deep dive into why expenses are skyrocketing for these attacks and how you can stop them in your organization.

    In this session, we will discuss:

    - The latest data, trends and insights for the phishing threat landscape
    - People-centric strategies to reduce costs associated with phishing
    - How tactics like security awareness and automation can reduce risk
  • 2021 Human Factor - Why People are Targets Recorded: Aug 25 2021 45 mins
    Daniel Blackford, Sr. Threat Researcher at Proofpoint
    Our premier annual report, The Human Factor, is the culmination of a year’s worth of threat research and insights drawn from more than 2.2 billion email messages, 35 billion URLs, 200 million attachments and 35 million cloud accounts. We have analyzed these trillions of data points to provide key insight into the current cybersecurity threat landscape.

    Join our threat expert for a special 45-minute webinar where he'll examine key findings from the new report. In this session, you will learn about:

    - The latest techniques and tactics used in attack campaigns—and why they work
    - The characteristics that make users vulnerable and lucrative targets
    - How threat actors pivoted to leverage COVID-19 themes
    How ransomware activity has evolved

    *This session is eligible for CPE credits with ISC(2).
  • Security Awareness Excellence: The Tip of the Iceberg Recorded: Aug 25 2021 54 mins
    Mike Bailey Senior PMM, Security Awareness & Brian Reed, Cybersecurity Strategy, Proofpoint
    You’ve sent out the phishing simulations. Assigned the appropriate training. Worked hard to get the word out about your program. Is it enough? Or just the tip of the iceberg?

    With security awareness, what you don’t know can hurt you. If you don’t know which users are being targeted by attackers, how can you protect them? If you don’t know users who are “click happy” with real malicious messages, how can you reduce your risk?

    Join us for a paradigm-shifting conversation on how “new-school” security awareness isn’t enough to address real people-centric risk.

    We’ll cover:

    - Ensuring a laser-focused approach to maximize your risk reduction
    - How metrics like click rate and reporting rate factor into your program
    - Engaging users to make them part of the IT security team
Proofpoint
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Awareness Excellence: The Tip of the Iceberg
  • Live at: Aug 25 2021 1:00 pm
  • Presented by: Mike Bailey Senior PMM, Security Awareness & Brian Reed, Cybersecurity Strategy, Proofpoint
  • From:
Your email has been sent.
or close