How to Stop Your Data from Leaving with...
Employees are leaving – and subsequently joining – new organizations at an unprecedented rate. As a result, the Great Resignation, often referred to as the Great Reshuffle, has created more opportunities for data loss than ever before. According to the 2022 Voice of the CISO report, 50% of CISOs agree that protecting data has become an increased challenge due to the Great Resignation. So, how do you protect your organization agains...
June 30, 2022
Organizer:
Proofpoint Location:
Webcast
How McDonald’s Keeps Security Awareness...
Successful business email compromise (BEC) attacks are causing billions in losses, while becoming more sophisticated and prevalent. The FBI in their 2021 IC3 Report showed 35% of all cybersecurity losses were from BEC. Organizations are adding new technologies and processes to stop the flood of new attacks. But what will actually move the needle? Join us for a 60-minute webinar. We’ll sit down with guest speaker Forrester Senior Analyst...
June 28, 2022
Organizer:
Proofpoint Location:
Webcast
Stopping Business Email Compromise with...
Successful business email compromise (BEC) attacks are causing billions in losses, while becoming more sophisticated and prevalent. The FBI in their 2021 IC3 Report showed 35% of all cybersecurity losses were from BEC. Organizations are adding new technologies and processes to stop the flood of new attacks. But what will actually move the needle? Join us for a 60-minute webinar. We’ll sit down with guest speaker Forrester Senior Analyst...
June 22, 2022
Organizer:
Proofpoint Location:
Webcast
Proofpoint's Nexus People Risk Explorer
Attendees will learn more on how Proofpoint's Nexus People Risk Explorer can benefit their organization. They will be able to see how Proofpoint's Nexus People Risk Explorer gives security executives visibility into the risk people pose to the rest of the organization. Attendees will also see how this tool can identify, assess, and mitigate people-based cybersecurity risks.
Protect Your Data and Secure Your Cloud...
In these rapidly changing times, organizations are facing Information Protection challenges both from internal and external sources, making user access and data protection critical. Organizations need a reliable cloud security program with a people-centric CASB tool to secure cloud applications, remediate cloud account compromises and gain real-time visibility into both user behavior and data. Join us for a 30-minute live demo and learn how yo...
June 15, 2022
Organizer:
Proofpoint Location:
Webcast
The Human Factor 2022
The Human Factor 2022* is the industry’s most comprehensive analysis of people-based cybersecurity risk. The report is the culmination of a year’s worth of threat research and insights drawn from more than 5 billion email messages, 35 billion URLs, 200 million attachments, 35 million cloud accounts and 1.7 billion suspicious SMS messages. It reveals surprising trends and offers actionable insight that sheds light on the nature of t...
June 9, 2022
Organizer:
Proofpoint Location:
Webcast
Wisdom 2022
85% of data breaches involve the human element. With today’s people-centric threat landscape, it’s more important than ever that your security awareness program empowers employees to be active defenders of your organization. At Wisdom 2022, you’ll get insights and best practices that can elevate your security awareness program. Like previous Wisdom conferences, you’ll hear directly from your peers as well as industry ex...
May 19, 2022
Organizer:
Proofpoint Location:
Virtual
Protect 2022
Welcome to Proofpoint Protect 2022. In a new world of advanced security threats and compliance risks, one thing remains the same. Attackers target people. And their techniques have evolved to become broader and more integrated over time. This makes it increasingly important to protect your people and your data. Join us at Protect 2022 to learn how you can tap into the power of Proofpoint to counter modern attacks and protect against compliance...
May 17-18, 2022
Organizer:
Proofpoint Location:
Virtual
Run Targeted Campaigns to Engage Users...
People get attacked in different ways depending on their role and data privilege. Attackers exploit this by sending targeted attacks aimed at your users’ unique weaknesses. The success of a security awareness program depends on addressing knowledge gaps and building security expertise and habits over time. How do you effectively deliver targeted training that’s relevant and engaging for all your employees? Join us for a 30-minute l...
May 5, 2022
Organizer:
Proofpoint Location:
Webcast
Making Supervisory Review Easier to Ena...
Financial services firms doing business in the U.S. must supervise and monitor digital communications, such as email, to enable regulatory compliance with mandates from governing bodies like FINRA and the SEC. Whether you’re tasked with replacing your entire stack of compliance products or are just looking for modern supervision technology that really works, we offer the tools to help you build, deploy, maintain and refine an audit-ready...
May 3, 2022
Organizer:
Proofpoint Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.