Back to Search Begin New Search Save Search Auto-Notify
Manage Data Security and Insider Risks...
The rapid adoption of remote and hybrid work models, as well as the need for business continuity, has made desktop as a service (DaaS) a major priority for organizations. Businesses need secure, reliable access to persistent desktops from any location while also defending their systems and sensitive data. Amazon WorkSpaces and Proofpoint’s Insider Threat Management (ITM) solution can work together to help defend against DaaS users acting...
February 8, 2022
Organizer: Proofpoint | Amazon Web Services (AWS)
Location: Webcast
Add Favorite
Prevent & Detect Business Email Comprom...
BEC attacks on city, state, local governments and educational institutions is a major cyber threat hitting organizations today. Across the nation, these attacks present a significant and unique challenge for resource-strapped local governments and educational entities. The FBI reports that 51% of all Cyber losses originate with BEC. Security leaders need strategies that help mitigate these common attacks and get ahead of threat actors today -...
August 19, 2021
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
Phishing Prevention with Isolation
Most organizations today have deployed some type of email security solution, but they are still miss phishing emails. Phishing emails are hard to detect because they typically carry non-malicious payloads avoiding basic security controls. So how can you better protect your company? Join our 45-minute webinar as our expert explains and shows a live demo on how leveraging tools like Isolation and applying adaptive security controls to your Very...
June 29, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Measuring Security Awareness Success
You’ve put in all the legwork to build a security awareness program – but how do you communicate success and get continued buy-in from your stakeholders? Can your reports meet the needs of the C-Suite and your CISO? If you need help measuring and sharing security awareness program success – this is the webinar you do not want to miss. Join us for a 30-minute deep dive into how real data about user behavior can give you an adv...
June 23, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Identify & Mitigate Risk with Proofpoin...
Innovation is critical in today's dynamic threat and risk landscapes, and effectively assessing the impact of risk on organizations can be challenging. Limited resources such as personnel, time, and budget make it increasingly difficult to proactively plan and implement an effective cybersecurity strategy. Therefore, it is critical for organizations to have a people-centric approach and platform to protect their users and reduce the risk of br...
June 22, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Why Legacy Security Tools Won’t Cut It...
Today, insider risk and data loss prevention (DLP) are a top concern for organizations with a distributed workforce and increasing reliance on technology. Legacy, on-prem DLP technology hasn’t lived up to its promises. That’s because data loss begins with people – whether negligent, compromised or malicious insiders. So how do you better protect your organization against insider risks? Join our experts on for a 30-minute live...
June 17, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Enhance Network and Security Efficiency
Today, advanced cyber-attack campaigns are perpetrated by a variety of actors with motives ranging from profit to espionage. Given the dynamic nature of these campaigns, it has become nearly impossible for organizations to keep pace with the changing threat landscape. Network intrusion detection and prevention systems and next-generation firewalls are sold with limited security signatures. Proofpoint ET Pro is a timely and accurate rule set fo...
June 15, 2021
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Email Fraud & Cloud Threats - Perspecti...
The email and cloud vectors have been combined by threat actors to target organizations’ most vulnerable asset: their people. Whether it’s an email with a link to a legitimate file sharing site or a 3rd party application, these attacks are aimed at specific people in an organization to steal money, data or sensitive information. So how can you combat targeted attacks and better protect your users? Join us for a 1-hour special panel...
June 15, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Wisdom 2021
Make your users ready with Wisdom You protect your people, and your people can protect you. With people as the new perimeter, it’s more important than ever your users are active defenders of your organization. Wisdom 2021 is a virtual event that offers insight into security awareness best practices, shared experiences from peers, and how to rethink driving behavior change. Wisdom attendees get access to Protect 2021 on June 8 and 9 to le...
June 10, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
Protect Your Data Against Supply Chain...
Supply chain attacks happen when a cybercriminal targets a vendor who has access to the valuable information of a larger organization or multiple organizations. According to Accenture Security, indirect attacks against weak links in the supply chain now account for 40 percent of security breaches1. So how can companies detect these attacks and harden security defenses against them? Join Proofpoint experts for a 30-minute webinar on supply chai...
June 10, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Back to Search Begin New Search