Back to Search Begin New Search Save Search Auto-Notify
A Holistic People-Centric Approach to I...
Your agency is facing a world today that is more global, transient, and connected than ever before. Traditional cybersecurity solutions are focused on outside-in. Modern security programs need to complement traditional security solutions with a solution that looks inside-out. Proofpoint's ObserveIT Insider Threat Management (ITM) correlates activity and data movement, empowering security teams to identify user risk, detect insider-led data bre...
November 10, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Mitigate Risk and Improve Security with...
With 94% of breaches starting with an email attack, it's more important than ever to protect your users from targeted phishing and malware attacks.Join us on November 5th, to learn how SailPoint and Proofpoint can detect and protect you against modern threats like ransomware, phishing, Business Email Compromise, and Employee Compromise while identifying and protecting your agency's vulnerable identities and their access to your most sensitive...
November 5, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
People-Centric Security for Cloud Services
Working safely and securely from remote locations has never been more important. However, legacy methods of remote access can open potential security risks. With most remote work happening over cloud-based email and other SaaS apps such as Office 365, G Suite, and Box, this leaves your remote workforce vulnerable as these apps contain sensitive data, which must be protected. The path to better cloud application security lies in an integrated a...
August 11, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing Data & Access for Your Growing...
The 2020 cyber threat landscape has changed drastically just over the last few months as some employees are mandated to work from home, and others are starting to go back in to the office. But throughout the changes, how you can ensure business continuity while keeping your end users protected?Join Proofpoint's experts Tim Choi, VP of Product Marketing, and Nathan Chessin, VP of Americas Technical Sales Engineering, as they discuss how you can...
August 3, 2020
Organizer: BrightTALK
Location: Webcast
Add Favorite
People-Centric Security for Cloud Services
Working safely and securely from remote locations has never been more important. However, legacy methods of remote access can open potential security risks. With most remote work happening over cloud-based email and other SaaS apps such as Office 365, G Suite, and Box, this leaves your remote workforce vulnerable as these apps contain sensitive data, which must be protected. The path to better cloud application security lies in an integrated a...
July 14, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Proofpoint LIve Demo - Prevent Phishing...
99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at...
June 16, 2020
Organizer: Proofpoint
Location: Webcast
Add Favorite
Proofpoint LIve Demo - Prevent Phishing...
99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at...
May 19, 2020
Organizer: Proofpoint
Location: Webcast
Add Favorite
How Do We Adapt To Remote Work and Stay...
To many, the switch to a remote workforce is a huge change with a new set of obstacles. The existing programs and procedures that compliance teams have put in place to protect businesses and identify risk were not designed for a work-from-home workforce. Many are wondering: how do we adapt to remote work and stay compliant? In this webinar we discuss tips and best practices to help ensure your workforce is staying compliant. We will share:- Po...
April 29, 2020
Organizer: Proofpoint
Location: Webcast
Add Favorite
Proofpoint LIve Demo - Prevent Phishing...
99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at...
April 28, 2020
Organizer: Proofpoint
Location: Webcast
Add Favorite
State of the Phish 2020
Do you have a good sense of how well your users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks?Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including: End-user awareness and knowledge gaps that c...
April 2, 2020
Organizer: Proofpoint
Location: Webcast
Add Favorite
Back to Search Begin New Search