Back to Search Begin New Search Save Search Auto-Notify
Protect 2021
Are you ready? At Protect 2021, you’ll get an insider’s view of the full suite of Proofpoint security, compliance and archive solutions. And you’ll learn how this industry-leading suite of solutions can help you improve your people-centric security and compliance journey. Get ready—and join us at this exclusive online event. Why attend Proofpoint Protect 2021?- Hear compelling keynotes from Proofpoint execs and industry...
June 8-9, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
PROOFPOINT SPOTLIGHT: People-Centric En...
Organizations worldwide need end-to-end protection around their people—wherever and however employees are working and collaborating. Proofpoint’s new people-centric Enterprise Data Loss Prevention solution helps organizations identify and quickly respond to data loss resulting from negligent, compromised, or malicious users. Along with Proofpoint’s Nexus People-Risk Explorer, organizations will have the first unified view of...
May 18, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Proofpoint Spotlight: Protecting SLED A...
Attackers are constantly evolving their tactics to target state and local governments and educational institutions and districts. They combine multiple vectors—email, cloud accounts and trusted third parties—to spread malware, harvest credentials and steal money. Because attackers are persistent and continually upping their game, you need an integrated, layered approach to defending against email and cloud threats. Join us at Proof...
May 13, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
How to Navigate Insider Risk: Top Tips...
Insider threats may initially appear to be just like any other threat, but the big difference is that insiders are in a position of trust. So how do you deal with these malicious or accidental threats that come from people within the organisation? Our Speakers will discuss the top tips from Gartner’s new report on Market Guide for Insider Risk Management Solutions. You will learn: - The “Rule of Three” for insider threats (in...
May 11, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
The Cost of Cloud Compromise and Shadow IT
With the increased use of SaaS applications, cloud account takeover and Shadow IT present an increasing security risk to organizations. As the network perimeter is replaced by a user-defined security perimeter, it becomes critical to evaluate access controls, threat detection and data security in the cloud. So how can you better protect your company?Join us for this special webinar with experts from Proofpoint and Ponemon Institute. They will...
May 5, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
In the Bullseye: Healthcare and Email T...
The Covid-19 Pandemic has impacted and stressed the healthcare industry in many ways. One of those ways have been the cyber and fraud threats that have mushroomed in frequency since the health emergency started. Threat actors are targeting individuals in certain verticals like Healthcare industry instead of networks and using email as their favorite vector. These Business Email Compromise (BEC) and Email Account Compromise (EAC) attacks are ai...
April 27, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Proofpoint Power Series: Protecting Aga...
No two Business Email Compromise (BEC) and Email Account Compromise (EAC) attacks are alike—they are complex, multi-faceted problems that are difficult to prevent and the costs can be devastating. Identity deception and spoofing result in compromised data and cost companies millions in fraudulent transactions. Cyber criminals use a wide variety of tactics and channels to conduct these types of attacks. They target your employees’ c...
April 21, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
Proofpoint Power Series: Mitigating Ins...
With the transition to work-from-anywhere becoming a reality and increasing reliance on technology, this shift could become a long-term trend; long after the pandemic ends. It’s more important than ever to develop strategies for managing and responding to insider risks within your organization – a challenge compounded by remote work. Security teams need to take steps to manage their people perimeter and equip their organization wit...
March 24, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
Information Protection for the Modern P...
How do you define the security perimeter when the work world as we know it has changed? With work-from-anywhere, data is everywhere and now people are the new security perimeter. Whether negligent, compromised or malicious, insider risk is on the rise. According to the latest Verizon Data Breach Report, insiders have driven 30% of all recent data breaches. Traditional Enterprise Data Loss Prevention (DLP) tools often miss insider incidents. Wi...
March 2, 2021
Organizer: Proofpoint
Location: Webcast
Add Favorite
Proofpoint Power Series: Phishing Meets...
Does it feel like no matter what you do phishing finds a way? There is no silver bullet for phishing, but an integrated, layered approach to email-based attacks can drastically cut your people-centric risk. Unmatched visibility into the threat landscape, leading behavior change tools, and automated remediation capabilities can help you fight back against these dangerous and pervasive attacks. Join this Power Series to hear about: How we can he...
February 17, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
Back to Search Begin New Search