Nach mehr als 18 Monaten Pandemie führt im Jahr 2021 an Cloud-Computing kein Weg vorbei - selbst in Unternehmen, die vormals eine absolute On-Premise Strategie verfolgten.
Noch immer beginnen mehr als 90 % aller Cyberangriffe mit einer E-Mail - doch Cyberkriminelle passen aktuell ihre Taktiken an und setzten auf eine Kombination aus E-Mail- und Cloud-Angriffen. Herkömmliche Perimeter-basierte Sicherheitsansatz greifen nicht mehr. Angreifer wissen, dass der einfachste Weg in Ihr Unternehmen über Ihre Mitarbeiter sowie deren E-Mails und Cloud-Konten führt.
Nehmen Sie teil an unserem On-demand Web-Seminar mit Markus Grüneberg und erfahren Sie, wie Sie auch für M365 und andere Cloud-Umgebungen starken Schutz sicherstellen können.
RecordedNov 3 202158 mins
Your place is confirmed, we'll send you email reminders
John Checco, Resident CISO, Proofpoint; Brandon Dunlap, Moderator
In a previous (ISC)2 webcast, we had a speaker say that organizations should look at ransomware “as an inevitable event or incident”. Ransomware attacks not only hit companies financially, but can impact their data, access and operations. And it has a ripple effect as we’ve seen disruptions in supply lines for fuel, utilities, food supply and other supply chains. Organizations need to focus on not just their security and threat awareness for their employees and partners, but also building resiliency and reducing unnecessary access. Join ProofPoint and (ISC)2 on December 16, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific for a discussion on the seismic waves that can be generated from a ransomware attack, the resulting collateral damage and how to better defend your organization from such attacks.
Matt Cooke, CyberSecurity Specialist, Proofpoint & Ed Rowley, Director, Email Security, Proofpoint
Ransomware is reaching epidemic levels. Not only Ransomware is growing by 300% a year, but over 75% of Ransomware attacks started with a phishing email. And, according to the FBI, the first six months of 2021 alone saw 62% more ransomware in the US. A trend that will surely make its way across the Atlantic before long. Is the time to get ready!
The solution to stopping ransomware attacks is not as simple as blocking malicious attachments. Attackers have matured their tactics and are now using email as the first step to gain access. Having secured access, they can deploy their ransomware as a second step - or broker the access to someone who will. This development is especially alarming when cyber criminals are exploiting trusted supply chain relationships to secure the initial access - or banking on companies "good enough" approach to cybersecurity.
Join this 30-minute webinar as we explore what it takes to secure email, protect people with no compromises, and dive deeper into:
The methods attackers use to bypass traditional email gateway defences
Why ransomware and supply-chain-attacks are two sides of the same coin
Why only a people centric security strategy will provide you with the visibility needed to prevent the initial attack from being successful
Neil Hammet, Director, Proofpoint & Ed Rowley Director, Proofpoint
The attackers have made it clear who they’re after: Your people. According to the 2021 Verizon Data Breach Investigations Report, 85% of breaches involve human error. And guess what, the main threat vector attackers are using is email.
Attackers are using a range of identity deception tactics, such as domain spoofing and lookalike domains, to lure victims into making fraudulent wire transfers. And among various types of email scams, supplier invoicing fraud often accounts for the most significant financial loss due to large B2B payments. So when it comes to Email Security and protecting your business against email fraud attacks, “good enough” solutions are just ‘not good enough’.
Join us for a 30-minute session where we will discuss the impact of when the effectiveness of preventive detection and blocking email fraud attacks is compromised.
In this session, we will dive deeper into:
Why Identifying your potential exposure to email fraud attacks is critical
How DMARC email authentication can help prevent the problem
Why protection against Business Email Compromise (BEC) is not a quick fix
What a trusted relationship within your supply chain should look like
How can you protect against your greatest email security weaknesses
Stephen Dougherty, Financial Fraud Investigator, U.S. Secret Service & Ryan Witt, Managing Director Healthcare, Proofpoint
Cybercriminals use sophisticated techniques to target health institutions and increasingly favor email fraud attacks. They’ve mastered social engineering lures to compromise email accounts, impersonate employees and incrementally gain access to critical medical systems. A single compromised email account can lead to a situation where an organization can’t provide patient care, where they are forced to stop medical procedures, or even re-create medical records from scratch because of the severity of the attack.
A strong cybersecurity posture directly relates to healthcare’s overarching mission of providing safe, effective patient care.
Join us for this one-hour session to explore:
• What groups your organization are most heavily targeted by threat actors
• Hardening your email defenses and identifying fraud
• Protecting sensitive data against fraud attacks and other exploits
Remote work opened the floodgates to ransomware attacks. So far in 2021, the number of ransomware attacks has doubled year-over-year. The challenge for organizations with remote workforces is making sure users don’t go where ransomware lives and preventing potentially dangerous activities. Many organizations have learned that secured web browsing can effectively curtail ransomware.
Join Ran Schwartz, Senior Product Manager, for a 30-minute webinar on how to prevent ransomware with a cloud-native web security solution. You’ll learn:
- How cloud-based web security effectively blocks ransomware and other sophisticated attacks
- Why isolating suspicious sites is critical to secure web browsing
- Why Proofpoint Web Security is your best alternative to traditional secure web gateways
Plus de 85 % des compromissions de données sont imputables à une erreur humaine. Il est donc indispensable d'apprendre à vos collaborateurs à contrer les cyberattaques pour protéger votre entreprise. Les RSSI et leurs équipes doivent adopter une approche moderne de la formation de sensibilisation à la sécurité qui induit des changements de comportement et favorise une culture de la sécurité. Une approche moderne qui fera des utilisateurs non plus des cibles, mais une solide ligne de défense.
Rejoignez Proofpoint et des experts en cybersécurité lors de notre événement L'art de l'instauration d'une culture de la sécurité dans le cadre du mois de sensibilisation à la cybersécurité. Vous bénéficierez de tous les conseils, informations et outils nécessaires pour instaurer une culture de la sécurité visant à favoriser l'engagement et la formation de vos utilisateurs et à faire d'eux des défenseurs actifs contre le phishing et autres cyberattaques.
Au programme de cette session en direct de 45 minutes :
- Comment élaborer des programmes de sensibilisation à la sécurité qui induisent des changements de comportement durables
- Les défis que constitue pour l'entreprise l'instauration d'une culture de la sécurité
- Comment les utilisateurs changent et l'impact de ce changement sur le développement de la culture de la sécurité
- Le rôle des indicateurs clés de performance pour évaluer l'efficacité des programmes de sensibilisation à la sécurité
Jesus Merida, Iberia Madrid talks to Nuria Andres & Jose Arias, Proofpoint Spain
Con más del 85 % de las fugas de datos provocadas por algún error humano, la seguridad de su organización pasa inevitablemente por enseñar a sus empleados cómo frustrar los ciberataques. Los CISO y sus equipos necesitan adaptar un enfoque moderno de la formación para concienciar en materia de seguridad que impulse cambios de comportamiento y fomente una cultura de seguridad. Un enfoque moderno que transforme a los usuarios de objetivos en defensores.
Únase a Proofpoint y a expertos en ciberseguridad durante el mes para la concienciación en ciberseguridad en El arte de la instauración de una cultura de seguridad para obtener las ideas, información y herramientas que necesita para crear una cultura de seguridad que involucre y forme a los usuarios y los convierta en defensores activos frente al phishing y otros ciberataques.
En esta sesión en directo de 45 minutos, descubrirá:
- ¿Cómo elaborar programas de concienciación en seguridad para generar cambios de comportamiento duraderos
- Los desafíos organizativos de instaurar una cultura de seguridad
- La evolución de los usuarios y el impacto en el desarrollo de la cultura de seguridad
- El papel de los indicadores de rendimiento clave y cómo medir el éxito
Sara Pan, Sr. Product Marketing Manager & Denis Ryan, Sr. Director of Email Security at Proofpoint
Since ransomware has been on the rise over the last year, the United States has seen more than 65,000 ransomware attacks1. It is one of the most active and profound threats facing organizations of any size today. 75% of ransomware attacks start with email phishing. With a simple click on an inconspicuous email or link, your organization can be crippled. A more effective way to combat ransomware is to shift left in attack chain and prevent attacks at the early stage before damage— protecting your email channel. You need to take a holistic, multi-layered approach. And authenticating email is one of the proactive actions you can take to help prevent the malware from arriving in your users’ inboxes. Join our 30-minute webinar and learn more about: - Common tactics used in ransomware and BEC attacks - How email authentication helps prevent threats leveraging spoofed domains - Why email authentication is a MUST 1. David Gura (NPR). “U.S. Suffers Over 7 Ransomware Attacks An Hour. It's Now A National Security Risk.” June 2021. Source: Palo Alto Networks Unit 42 Ransomware Threat Report
Mehr als 85 % aller Kompromittierungen sind auf menschliches Versagen zurückzuführen. Das bedeutet im Umkehrschluss, dass Sie die Sicherheit Ihres Unternehmens nur dann gewährleisten können, wenn Sie Ihre Mitarbeiter zur Abwehr von Cyberangriffen schulen.
Wenn CISOs und ihre Teams Security-Awareness-Programme im Unternehmen implementieren, muss das Ziel neben der Wissensvermittlung auch immer sein, das Anwenderverhalten zu verändern und eine Sicherheitskultur aufzubauen. Mit einem solchen modernen Ansatz für Sicherheitsschulungen werden Anwender von Angriffszielen zu Verteidigern der Unternehmenssicherheit.
Im Cybersecurity-Awareness-Monat sprechen Proofpoint- und Cybersicherheitsexperten über die Kunst und Wissenschaft beim Aufbau einer Sicherheitskultur. Im Proofpoint Live Talk erhalten Sie die Einblicke, Informationen und Tools, die Sie zum Aufbau einer Sicherheitskultur in Ihrem Unternehmen benötigen. Erfahren Sie, was Ihre Anwender anspricht und sie zu Mitarbeitern in der aktiven Abwehr gegen Phishing- und andere Cyberangriffe macht
In diesem 45-minütigen Live-Gespräch erhalten Sie Informationen zu folgenden Themen:
- Aufbau eines Awareness-Programms, mit dem Sie dauerhafte Verhaltensänderungen erreichen
- Organisatorische Hürden beim Aufbau einer Sicherheitskultur
- Ein Wandel bei Anwendern und seine Auswirkungen auf die Entwicklung einer Sicherheitskultur
- Die Rolle von Kennzahlen bzw. KPIs (Key Performance Indicators) und die Erfolgsmessung
Shawn Aquino, Product Marketing Manager, Stan Guz, Archiving Specialist, Rod Harris, Account Manager at Proofpoint
In today’s increasingly complex IT environments, many organizations struggle with managing legacy data, retention policies and mitigating compliance risk, all while dealing with limited IT resources. A proven archiving solution can be the foundation for addressing these and other legal and compliance challenges. Join our 30-minute webinar for a candid discussion with our panel of archiving specialists. You’ll learn: - How to empower IT, Legal and Compliance teams to help streamline workflows and reduce related costs - Why understanding and addressing compliance risk beyond capturing and managing email is critical - How customers have achieved success with Proofpoint archiving, e-discovery and supervision technology
Brian Reed, Cybersecurity Strategist at Proofpoint & Joseph Blankenship, VP Research Director at Forrester Research
Most organizations deploy defenses to reduce the risk of cyber threats entering their environment. But what about the threats that are already inside? Whether the result of malicious, negligent or compromised users, insider threats pose serious business risks, and most organizations just aren’t prepared. Join our special one-hour webinar with guest speaker, Forrester Research’s Joseph Blankenship, VP and Research Director for Security & Risk, to learn: Why insider threats are unique and require different types of response - The importance of contextual intelligence to determine intent of an insider threat - How to handle incidents quickly and efficiently and triage what matters - How to plan for and take proactive measures to stop the next insider threat based on real-world insider threat examples
Mike Bailey, Product Marketing Manager for Email Security & Brian Reed, Cybersecurity Strategist at Proofpoint
Phishing threats are soaring – and getting more sophisticated. Attackers are doing more research on the people they’re targeting, compromising accounts, and even building entire fake streaming sites to trick users. Join us for a special conversation with Proofpoint guest panelists to learn about how they’re applying a layered, integrated solution to drastically cut the risk of phishing. In this 30-minute panel you’ll learn about: - Automating incident response while encouraging users to report phish - Gaining greater people-centric visibility for preventative measures - Using targeted training based on threat intelligence to educate users
Stephen Fulton, Proofpoint, Dennis Sullivan, Vice President, Senior Compliance Officer, PIMCO; Brandon Dunlap, Moderator
Do you know who in your organisation has the most significant exposure to compliance risk? Are they at risk because of their actions, or are they targets? How do you build a complete picture of their risk profile identifying potential risky behaviour? Join Proofpoint, (ISC)2 and Dennis Sullivan, Vice President, Senior Compliance Officer of Industry Leading Pimco, to listen to a case study on how they achieved world-class Supervision, from implementation, optimisation in production and how to look ahead to apply practical AI machine learning. On November 16, 2021 at 1:00p.m. GMT you’ll discover how big data analytics and ML can be brought to bear in the fight against misconduct by building an effective people-centric view, promoting a culture to protect your people from compliance violations, whilst safeguarding the whole organisation. Learn the practical steps now and how to scale into the future.
Michelle Drolet | Kelvin Murray | Paul Prudhomme | James Johnson
As organizations face several different challenges in 2022 and beyond, preparing for a cyber attack is as important as ever. Businesses face a myriad of cyber threats; from phishing to ransomware, it's imperative that your organization puts in place measures to protect your most important assets.
Join top security leaders for an interactive discussion on how to better secure the enterprise in 2021 and learn more about:
- Trends in cyber attacks and what's at risk
- Prevention best practices
- Solution recommendations for attack detection and response
- Top threats on the horizon and what's at risk
- How organisations can take the necessary steps to prepare for the unexpected and build business resilience
Michelle Drolet, CEO, Towerwall
Kelvin Murray, Snr. Threat Researcher, Carbonite + Webroot, OpenText Business Solutions
Paul Prudhomme, Head of Threat Intelligence Advisory at IntSights, a Rapid7 Company
James Johnson, Cloud & Data Security Specialist, ATG - EMEA, Proofpoint
Andy Rose, Resident CISO, Proofpoint; and Jenny Radcliffe, Cybersecurity Consultant, The Human Factor
With more than 85% of breaches involving human error, teaching your employees how to thwart cyber attacks is critical for the security of your organisation. CISOs and their teams need to adapt a modern approach to security awareness training that drives behavioural change and eventually a security culture. A modern approach that transforms users from targets to defenders.
Join Proofpoint and Cybersecurity experts during Cybersecurity Awareness Month to get the insights, information, and tools you need to build a security culture that engages and educates your users and turns them into active defenders against phishing and other cyber attacks.With more than 85% of breaches involving human error, teaching your employees how to thwart cyber attacks is critical for the security of your organisation. CISOs and their teams need to adapt a modern approach to security awareness training that drives behavioural change and eventually a security culture. A modern approach that transforms users from targets to defenders.
In this live 45-minute session, you’ll learn about:
How to build security awareness programs to create sustained behaviour change
The organisational challenges of creating a security culture
How users are changing and how this impacts security culture development
The role of key performance indicators and how to measure success
Robert Biestman, Threat Intelligence Specialist and Jen Nicastro, Threat Intelligence Manager
Email is a critical threat vector for malicious activity including ransomware, fraud, credential phishing, and data theft. While strong systems can help security teams fight threats, what they really need to mount a robust “defense-in-depth” response is context and intelligence.
For existing Targeted Attack Protection (TAP) customers, this webinar will demonstrate how our team of analysts and researchers can provide deep insight into email threats and improve your security posture with regular briefings, reporting, and the latest threat intelligence.
Join us for a 30-minute conversation about the email threat landscape and see Proofpoint's Premium Threat Information Services (PTIS) in action.
In this session, we’ll share:
- How Proofpoint’s Premium Threat Information Services provides you with a deeper understanding of the threat landscape, both within your industry and globally.
- How you can get better visibility into specific threats and actors targeting your organization.
- How you can make better decisions faster to mitigate the risks of malicious campaigns targeting your organization.
- How analysis, context, and informed perspectives can fill in the gaps that SIEM feeds and automated tools cannot.
Ransomware and Phishing continue to make headlines and remain one of the top threats in cybersecurity. Join us in this session to understand why the evil twin remains the top cybersecurity threat across the globe. Current trends of the modern threat landscape and how a single email could land a whole business in ransom. More importantly, how organisation can better protect themselves from being phish into ransom by taking on a people-centric approach.
The speaker delivering this session is:
Philip Sow, Sales Engineering Manager, SAK
Philip is a seasoned security professional and Sales Engineering Manager with experiences across the APAC region. He leads a team of highly qualified pre-sales engineers across the regions to help companies adopt a people-centric security program and help these organisations stay ahead of threats coming from every channel including email, web, cloud, social media, and mobile. Prior to Proofpoint, Philip spearheads the digital risk protection solution for Digital Shadows in APAC and also led the pre-sales team in Splunk deploying operation and security analytics solutions in South Asia.
Brian Reed, Cybersecurity Evangelist, Proofpoint - EMEA
Over the last two years alone, insider security incidents have jumped 47%, with the average cost per incident up 31%. That risk is only increasing in an era of remote working and distributed teams.
Today, anyone with insider access—outside contractors, consultants and vendors—can pose an insider threat. Many organisations are learning that the hard way.
Join us for this 30-minute webinar to explore some of the biggest insider attacks of 2021 – and what you can do to avoid similar threats.
- The unexpected ways insiders can steal money, disrupt business and tarnish your brand
- How third-party vendors can pose as big of an insider threat as your employees
- Tricks that outside attackers use to gain insider access
- Tips for managing insider threats and risks in your organisation
Ryan Witt, Resident Healthcare CISO & Chair for Healthcare Customer Advisory Board
Cyber criminals use sophisticated techniques to target health institutions with ransomware attacks, imposter emails and other exploits. In most cases, obtaining credentials is the start of the attack chain, so cyber criminals have mastered social engineering to create targeted messages that are compelling and relevant to the receiver. Indeed, people have become healthcare’s most prominent threat vector, and the industry must protect the human element against the heightened volume of advanced threats.
In this 30-minute healthcare threat briefing, we will discuss new threat intelligence research that can help healthcare organizations better understand today’s advanced attacks exploiting human flaws.
Using this research, we will demonstrate how these vulnerabilities can put healthcare institutions at risk and discuss how to build a strategy that:
- Reveals who is targeted
- Combat attacks before they reach your users
- Offers techniques for a more robust cybersecurity posture
Gretel Egan, Sr. Security Awareness Training Strategist
As retailers roll out their holiday deals, cybercriminals seek to trick shoppers with phishing sites, forged discount codes, and fake offers. Since many people use their corporate devices to check personal emails, social media, and shopping sites, holiday scams are a threat to both individuals and businesses.
Now is the time to remind your users to be on the lookout for holiday scams.
Join this 30-minute webinar and learn best practices to share with your users as the holidays approach.
In this session, you’ll learn about:
- Common and not-so-common tactics that scammers use during the holiday season
- Real-world examples of holiday scams
- Practical advice that will help your users make safer choices
- Steps and resources you can leverage during the holiday season to keep your users safe
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.