Hi [[ session.user.profile.firstName ]]

The Insider Threat: Real Defense for Real Business

Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place?

In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business. Attend this webinar and you’ll learn:

What essentials must be in your end user awareness program and how to make those lessons stick
Which tools and techniques can be used to enforce security policies when your users unintentionally or maliciously try to break them
How you can spot the signs of an impending or ongoing insider data leak and respond
Recorded Mar 27 2019 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sara Peters, Kurt Wescoe & Katie Burnell
Presentation preview: The Insider Threat: Real Defense for Real Business

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Demo: Security Awareness Training Sep 5 2019 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Proofpoint Security Awareness Training Aug 20 2019 4:00 pm UTC 45 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • From Skeptics to Champions: Selling the Value of Security Awareness Training Recorded: Aug 15 2019 106 mins
    Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader
    The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.

    Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.

    Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:

    - Best practices for selling the value of security awareness training internally
    - Preparing a business case for your training program
    - Engaging employees through creative programming, recognition, and incentives
  • Live Demo: Proofpoint Security Awareness Training Recorded: Aug 6 2019 33 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Beyond the Phish: A Snapshot of End-User Behavior Recorded: Jul 31 2019 59 mins
    Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist
    Phishing is one of InfoSec's longstanding threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end users about cybersecurity threats beyond email-based social engineering
    - The strengths and weaknesses among end users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization
    - A more wholistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks
    - How you can use this information to reduce the risk of successful cyberattacks within your organization

    Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Proofpoint Security Awareness Training with Customization Center Recorded: Jul 25 2019 32 mins
    Shani Mahler, Product Manager & Mike Bailey, Sr. Product Marketing Manager
    Security awareness training is not one size fits all. Every organization, region, and even departments or specific roles can have different training needs. Which is why we introduced our Customization Center to enable administrators to tailor their content and assign it quickly to their end users.

    Join us as our experts talk about how you can utilize the Customization Center. This self-service customization enables quick turnaround of changes and the greatest flexibility in personalizing content for your organization at no additional charge to customers. The new version allows administrators the ability to manipulate most visible text, including the questions in the quizzes as well as the text across all supported locales.

    You'll learn how to:

    - Create customized, role-based training for individual departments, roles, or regions to ensure relevancy to specific users or groups
    - Provide a quality educational experience and continue to drive behavior change while customizing content
    - Align training with the knowledge level and cyber security maturity for your organization
    - Ensure your training content remains consistent for multinational audiences
    - Edit training to maintain US Section 508 and WCAG 2.0 AA compliance and ensure users with disabilities have the same opportunity to learn
  • Proofpoint Demo: Security Awareness Training Recorded: Jul 23 2019 36 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo - Proofpoint Security Awareness Training Recorded: Jul 9 2019 36 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 

    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Live Demo: Proofpoint Security Awareness Training Recorded: Jun 25 2019 37 mins
    Sean Walker, Enterprise Account Executive
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • The Insider Threat: Real Defense for Real Business Recorded: Mar 27 2019 61 mins
    Sara Peters, Kurt Wescoe & Katie Burnell
    Insider data leaks, whether malicious or accidental, can be caused by anyone: the extra-helpful customer service rep, the highly privileged IT admin or the jet-setting CFO. How do you detect and mitigate insider data leaks and reduce the potential for such incidents in the first place?

    In this webinar, learn how cybersecurity professionals can address the insider threat without shutting down business. Attend this webinar and you’ll learn:

    What essentials must be in your end user awareness program and how to make those lessons stick
    Which tools and techniques can be used to enforce security policies when your users unintentionally or maliciously try to break them
    How you can spot the signs of an impending or ongoing insider data leak and respond
  • SecureWorld Behind the Scenes Interview: 2018 User Risk Report Recorded: Mar 27 2019 28 mins
    Gretel Egan & Kurt Wescoe
    Go behind the scenes of our 2018 User Risk Report.
  • SecureWorld 2018 User Risk Report Webinar Recorded: Mar 27 2019 102 mins
    Gretel Egan, Brand Communications Manager, Proofpoint Security Awareness Training
    We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening.

    We will discuss the 2018 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide, including:

    Knowledge of phishing and ransomware


    Password habits (including password reuse)


    Safe use of WiFi, location tracking, and social media


    The types of personal activities (shopping online, playing games, streaming media, etc.) that your organization's devices are being used for by employees and their families and friends
  • Cybersecurity Heroes Aren't Born... They're Made Recorded: Mar 27 2019 122 mins
    Amy Baker - VP of Marketing, Proofpoint Security Awareness Training
    Phishing continues to be one of the fastest growing and most malicious threats to the security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated technical safeguards through carefully planned, socially-engineered emails that are only getting more advanced.

    During this panel, we will discuss key findings from Proofpoint’s 2018 State of the Phish™ and 2018 Beyond the Phish® Reports. You will gain insight into current vulnerabilities, industry-specific phishing metrics, and emerging threats.
  • End User Cybersecurity Behaviors: The Importance of Training Beyond the Phish Recorded: Mar 27 2019 107 mins
    Amy Baker - VP of Marketing, Proofpoint Security Awareness Training
    Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering.

    During this session, we will share results from the Proofpoint Security Awareness Training 2018 Beyond the Phish® Report, which analyzes data from nearly 85 million responses to cybersecurity knowledge assessments and training challenges presented to global end users across multiple industries during 2017. We will discuss end users’ strengths and weaknesses across 12 cybersecurity topics — from identifying social engineering scams to protecting confidential information to working safely outside the office. We’ll also highlight variations in end-user knowledge levels across industries, giving you a benchmark against which to compare your organization’s readiness.

    Attendees will also see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks, and how using these tools together can give a more complete view of susceptibility. Finally, we’ll provide guidance about how to use this information to strengthen your end users and reduce the risk of successful cyberattacks within your organization.

    Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community.

    During this panel, we will discuss key findings from Proofpoint's 2018 State of the Phish and 2018 Beyond the Phish® Reports. You will gain insight into current vulnerabilities, industry-specific phishing metrics, and emerging threats.
  • SecureWorld: Behind the Scenes 2018 Beyond the Phish® Report Recorded: Mar 27 2019 26 mins
    Amy Baker and Kurt Wescoe
    Go behind the scenes of our 2018 Beyond the Phish Report

    Phishing has long been a headline threat for infosec teams — but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering.
  • The People Factor: Fight Back Against Phishing Podcast Recorded: Mar 27 2019 18 mins
    Kurt Wescoe – Chief Architect, Proofpoint Security Awareness Training
    How to Turn Your Top Vulnerability Into a Defensive Asset

    Phishing remains the top attack vector used by cybercriminals, and every end user is a potential target. But with the right security awareness training, these same people can be transformed into a key component in your anti-phishing defense. Kurt Wescoe, Chief Architect of Proofpoint Security Awareness Training, shares his insights and perspectives in this interview hosted by BankInfoSecurity.

    Listen to the interview to learn more about:

    Current phishing trends
    What’s wrong with traditional end-user training
    How Proofpoint takes a different approach to security awareness training
  • State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users Recorded: Mar 13 2019 39 mins
    Paul Down, Senior Director Proofpoint Security Awareness Training
    As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.

    Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.

    Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:

    - How to build a people centric security strategy

    - Steps organizations are taking to mitigate end-user risk from phishing

    - The most devastating types of phishing emails

    - The most vulnerable industries and departments
  • Live Demo: Security Awareness Training for Healthcare Recorded: Mar 5 2019 36 mins
    Ryan Witt, Healthcare Industry Practice Leader; Joshua Whisnant, Security Awareness for Healthcare
    The latest threat data for the Healthcare industry shows a significant shift away from attacks on infrastructure towards personalized attacks like phishing.

    What are the key components of a best-in-class solution for phishing simulation and training?

    Join this live demo to see Proofpoint Security Awareness Training in action, and learn how it addresses the most common attacks in today's Healthcare threat landscape.
Right People, Right Education, Right Time
Our training has been proven to change the behavior of end users and reduce risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Insider Threat: Real Defense for Real Business
  • Live at: Mar 27 2019 7:50 pm
  • Presented by: Sara Peters, Kurt Wescoe & Katie Burnell
  • From:
Your email has been sent.
or close