The InteliSecure Solution Series is a series of short (15 minute) whiteboarding sessions covering topics that are relevant for security leaders. Below is a short description of the topic. Due to the format, questions will be addressed at the conclusion of the session.
Risk Adaptive technology refers to Information Security capabilities that can evaluate risk and adapt protection profiles to the identified risk. Since the basis of Information Security should be risk mitigation, these technologies resonate with security leaders on a conceptual level. Join InteliSecure CTO Jeremy Wittkop as he discusses how these technologies can be deployed to help organizations protect data and manage risk effectively.
RecordedMay 12 202011 mins
Your place is confirmed, we'll send you email reminders
Rick Dales, VP of Product Management, Dan Rapp, VP of Engineering & Data Science at Proofpoint
False positives are the bane of any team reviewing digital communications to help enable regulatory compliance. They’re flagged as potential risks, so teams must spend countless hours manually reviewing and removing them from their queues. There is a better way.
Proofpoint NexusAI for Compliance provides out-of-box machine learning models that utilize past reviewer decisions to significantly reduce low-value supervision content. This allows you to focus on meaningful content, while reducing reviewer fatigue and human errors caused by fatigue.
Join us for a 30-minute webinar for a deep dive into this new technology. Our experts will:
- Discuss how AI/ML technology can help enable regulatory compliance
- Illustrate how you can remove up to 65% of false positives compared with legacy systems without machine learning
- Demonstrate integration with Proofpoint Intelligent Supervision, offering next generation surveillance
Brett Shaw, Senior Product Marketing Manager, Proofpoint, Inc., Victor Soares, Group Product Manager, Proodpoint, Inc.
Email fraud is rife. In fact, the FBI reported that email fraud attacks accounted for nearly $1.9 billion losses in 2020. These attacks are very difficult to detect, not only because they don’t contain payloads, but because they can appear to come from trusted sources, like a C-level executive or even a hijacked supplier account. So how can you better protect your organization?
Watch our live demo on how you can defend against and identify email fraud with Proofpoint’s Threat Protection Platform.
- The different tactics threat actors use to target your users with BEC attacks
- Best practices to prevent attacks and identify who is being targeted
- How Proofpoint helps mitigate risk, provide visibility and drive operational efficiency
Mike Bailey, Sr. Product Marketing Manager at Proofpoint and Customer Panelists
We are trying something new with Insiders Meetings. We know you love hearing from your peers at Wisdom every year but want more engagement with them outside of our once-a-year user conference.
Based on your feedback, we're kicking off a new 1-hour panel format where you'll be able to hear from your peers, ask questions, and make new connections. Our theme in May will be “Springing into Action: Get Buy-In for your Security Awareness Program”.
Peter Rucys, Tampa General Hospital, Rob Holmes, Email Fraud Defense, Ryan Witt, Proofpoint Healthcare Customer Advisory
In a recent survey, Proofpoint found that the average healthcare organization received about 200,000 emails from over 10,000 different domains, including those belonging to research organizations, construction companies, grantors and foundations and insurers, as well as classic supply chain participants. Of these clients, 98% received some email-based threat and 97% received threats from at least one of their suppliers’ domains via impersonation or business email compromise. One trend stands out: today’s attacks target people, not just infrastructure. The sheer volume and value of business conducted by email is a noteworthy reason to focus on protecting your supply chain. In this session, we’ll discuss the most critical issues impacting healthcare IT and Security leaders today.
• A view into the current threat landscape
• The unique risks of the supply chain to patient safety
• Security considerations and transformations for 2021
Robert Shields, Sr. Product Marketing Manager & Susan Mackowiak, Sr. Director of Content at Proofpoint
Behavior change is the ultimate goal for security awareness training. To be successful at mitigating threats, organizations need to implement a targeted, agile security awareness training program that considers today’s threat landscape as well as the diversity of their workers’ roles and knowledge. By accommodating roles, competencies and threats, companies can accelerate behavior change to build a strong security culture. So how can you achieve this?
Join us for a 30-minute webinar as our experts discuss how to build an effective security awareness training program and culture.
In this session we will explore:
- A new framework to guide content creation
- The curation of content that addresses your threats, risks and compliance needs
- Personalized learning paths you can leverage to change behavior and enable culture change
Employees depend on digital communication tools to collaborate more than ever before. Chat and collaboration apps have made it possible for employees to communicate with ease, but they can also put organizations at risk. As they adopt new communication tools, companies need to ensure that security, compliance, and legal requirements are considered and adequately addressed.
Watch this webinar where we discuss critical considerations for a successful collaboration initiative. You’ll learn about:
- Importance of a fit analysis
- Engaging the right players
- Security considerations
- Legal and compliance concerns
Sai Chavali, Sr. Product Marketing Manager, Proofpoint
Collaboration is key in today’s workplace. However, broadening the supply chain to include remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. To safeguard your critical IP and sensitive data, organizations need to take a people-centric approach to protect their data and mitigate insider risk.
Watch our 30-minute webinar to learn about how the technology sector and others in agile, collaborative industries can manage insider threats. In this webinar, we’ll cover the four strategies on how to:
● Allow for open collaboration by using data to identify user risk
● Protect your competitive advantage with real-time IP data tracking
● Safeguard user data when working with third parties across your supply chain to remain compliant
● Prepare your incident response plan to avoid unnecessary data loss
Sara Pan, Sr. Product Marketing Manager, Proofpoint
According to the 2020 FBI Internet Crime Report, attackers have shifted their email fraud tactics away from hacking the email accounts of C-levels to compromising vendor emails. The report also reveals that email fraud accounts for 44% of all reported losses in 2020. While these attacks are low volume, they represent huge dollar losses and are constantly evolving. So how can you better protect your company?
Watch our 30-minute webinar for a deep dive into the FBI insights of email fraud and the best practices of combating it. In this session, we'll cover:
· What email fraud variants the FBI report has called out
· How attackers leverage impersonation and compromised accounts jointly in an attack
· What security controls and framework you can adopt to better defend against email fraud
Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, Proofpoint
Insider threats may initially appear to be just like any other threat, but the big difference is that insiders are in a position of trust. So how do you deal with these malicious or accidental threats that come from people within the organisation?
Watch Proofpoint’s experts Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, as they discuss the top tips from Gartner’s new report on Market Guide for Insider Risk Management Solutions. You will learn:
- The “Rule of Three” for insider threats (including threat types, threat activities, and mitigation goals)
- How to employ an insider threat mitigation program comprising people, processes, and technology
- Considerations when purchasing insider risk management technology
Discover what you need to know about insider threats, how to protect your organisation and navigate these risks.
Ryan Witt, Healthcare Industry Practice Leader, Robert Kreuscher, Sr. Sales Engineer, Shannon Smith, Archive Sales Specialist
Cloud-based applications like Microsoft 365 keep your healthcare organization operating, especially in today’s digital world. Yet securing data, adhering to data privacy and record keeping, while protecting against fraudulent activity, can be a significant challenge. Healthcare organizations need a people-centric approach to detecting risky behavior and litigation readiness.
Watch our 30-minute panel discussion about how your peers are addressing these challenges and the steps you can take to ensure compliance across your electronic communications ecosystem. This session covers:
- Common compliance challenges and pitfalls when it comes to e-discovery and risk detection, especially around Microsoft 365
- How your capture and archive strategy can augment your information protection program
- How Proofpoint’s people-centric approach to security and compliance helps better protect healthcare organizations
Lucia Milica, CISO, Proofpoint, Robbie Meitler, AVP, Liberty Mutual, Rebecca Harness, CISO, Saint Louis University
Phishing and social engineering attacks continue to grow in frequency and sophistication. They challenge security leaders and practitioners who struggle to track and stop their elusive and persistent tactics. Given the magnitude of the challenge, many security leaders consider this their No. 1 priority for 2021.
Join our customer and CISO panel to learn more about these threats and how security leaders are using intelligence, controls and their people to reduce the risk of breach and data loss.
In this session, our experts will cover:
-How phishing and social engineering attacks have increased
-How organizations are being targeted
-How your company culture affect risk
-Options for you to better protect you company
Brian Reed, Product Evangelist, Proofpoint, Inc., Joseph Blankenship, VP and Research Director for Security & Risk, Forrester
After a year of remote work, we are beginning the return to “normalcy” in many places. So what happens as the workforce shifts to a hybrid model of partial in-person and partial remote work? How do you guard from external attacks and manage insider risks – whether accidental or malicious?
Watch our special 1-hour webinar with guest speaker, Forrester Research’s Joseph Blankenship, VP and Research Director for Security & Risk, to discuss key insider threat factors with a remote and hybrid workforce.
This webinar covers:
· What the trend towards hybrid work means for organizations that are dependent on third-party users and supply chain vendors
· How to share information in a way that protects against data loss
· How to build a business case for an insider threat management program (ITMP)
Itir Clarke, Senior Product Marketing Manager, Proofpoint, Inc., Lucia Milica, Global Resident CISO, Proofpoint, Inc.
Data privacy regulations are growing more complex, and the penalties for noncompliance can be severe. Companies need a risk-based approach to PII protection across email, cloud apps and endpoint to prioritize and address compliance challenges in the cloud era. This requires visibility to data risk, but also people risk. So how can you achieve this?
Watch our 30-minute webinar with Lucia Milică, Proofpoint Global Resident CISO, to learn how a people-centric approach to Information Protection can help you achieve a risk-adjusted privacy program:
We cover how you can:
- Discover which data and people pose greater PII compliance risks
- Reduce risk by training and improving data traceability
- Keep privacy data safe using people-centric controls and reporting
Sara Pan, Sr. Product Marketing Manager, Proofpoint
Email fraud schemes have evolved to include supplier account compromise. Based on Proofpoint’s internal research, 98% of monitored organizations have received threats from their suppliers— whether they’ve been spoofed or compromised. Unfortunately, most organizations lack visibility into which suppliers pose risk. So how can you better defend against threats from these risky suppliers?
Watch our webinar for a deep dive into the best practices of combating supplier impersonation and account compromise. In this session, we'll cover:
- Real-world supply chain fraud examples
- Grading risk in your suppliers
- How to detect threats, including payroll diversion and supplier invoicing fraud
- A framework that helps you stop these multi-million-dollar email fraud attacks
Robert Kreuscher, Senior Sales Engineer, John Pepe, Market Development Principal, Shawn Aquino, Sr. PMM, Proofpoint
Monitoring digital communications has long been a standard practice for highly regulated organizations to ensure that they meet compliance standards.
But what are other use cases for supervision?
Watch our 30-minute live demo to learn how you can utilize supervision technology to mitigate conduct risk in broad areas of exposure, such as toxic workplace, mergers and acquisitions, and brand reputation. We’ll cover how to:
· Monitor for infractions and post-event investigations
· Identify major potential risks, including high-risk individuals and view violation trends over time
· Use analytics tools to understand the deeper context and inter-relationships of communications
Over 90% of breaches start with attacks targeting people via email. Whether it’s malware, credential phishing or email fraud, organizations need a comprehensive layered solution to protect against these attacks.
Watch Proofpoint’s expert for a demo on how you can protect your people against the ever-changing threat landscape by providing visibility, risk reduction and operational efficiency with Proofpoint’s Threat Protection Platform.
- How threat actors are leveraging email and cloud together to target your users
- How the platform provides visibility into your biggest risk: your people
- How Proofpoint helps mitigate risk and drives operation efficiency
Sam Masiello, Ciso, Gates Corp, Mark Guntrip, Product Director, Proofpoint, Daniel Greene, Esq., Attorney, Beckage PLLC
Phishing attacks have a negative and costly impact on organizations. IT professionals find themselves spending time on resolving potentially malicious messages and abuse mailboxes, resulting in user downtime. With attacks like credential theft, ransomware, and business email compromise (BEC) increasing, and the added complication of people working from home, it's time for a new preventative approach. There is no silver bullet, so it is essential for organizations to take a multi-pronged approach to address this problem. Watch our panel of experts discuss:
• Strategies for an integrated approach to phishing
• Finding and balancing the right controls
• Best practices for reducing risk and cutting costs
52% of organizations have compromised cloud accounts, resulting in data loss, wire fraud, spam and more. Companies need to monitor cloud usage, mitigate account takeover and govern cloud apps to protect sensitive data. So how can you achieve this?
Watch our demo of Proofpoint’s Cloud Access Security Broker (CASB) to see how you can protect your users from cloud threats and safeguard sensitive data while staying compliant.
We cover how you can:
- Understand the cloud threats facing your organization and users by leveraging Proofpoint’s threat intelligence
- Discover sensitive data in cloud apps and mitigate data security risks
- Control access to cloud apps and data for unmanaged devices
Sai Chavali, Sr. Product Marketing Manager, Proofpoint, Tony Kubinksi, Sr. Sales Engineer, Proofpoint
Not all users are alike. Some will pose a higher risk to your organization than others. Managing insider threats starts with deciding which of your users pose the biggest risk – whether they’re employees, privileged users, contractors, third parties or supply chain partners.
Watch our live demo to learn how to build a practical, technology-enabled insider threat management program to protect your data.
In this 30-minute live demo, you will learn:
- How to recognize high risk users with common use cases
- Why context into user activity and data movement is key to identifying insider threats
- Practical security tips to protect your organization from the loss of critical data and IP
Information security processes developed for on-premises infrastructure have been network-centric and often fall short of mitigating the unique risks of cloud usage. Companies need a holistic cloud governance program that accounts for the diverse interests of the internal stakeholders and regulators as well as the risk profiles of your cloud users.
Watch this special webinar with guest speaker Andras Cser, Vice President & Principal Analyst serving Security & Risk Professionals for Forrester Research, to discuss best practices for cloud governance and a people-centric approach to cloud security. We discuss:
- Who is responsible for securing workloads in the cloud
- The appropriate protections for cloud users, workloads, and data
- Processes and tools you require as you migrate to the cloud
- Examples of better security controls for cloud apps and services
InteliSecure is a managed security services provider specializing in data protection. With more than 15 years’ experience, 500 plus customers and 2 plus million users, companies large and small rely on our services and specialists to protect the integrity and safety of their sensitive information. We make data security and compliance easy by providing more effective data protection services at lower cost, eliminating the strain on IT organizations, and reducing the risk of confidential information getting into the wrong hands.