89 past events found
+ 17 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Compliance Gateway Upstream Reconciliation
Highly regulated verticals, such as financial services firms, actively monitor and surveil digital communications to ensure they meet FINRA and SEC compliance regulations. How do firms ensure accuracy so that what they have in their archive or data store is comprehensive? The first of its kind in the industry, Proofpoint Compliance Gateway (version 2.16), can provide a complete audit trail and corroborate chain of custody for rules of evidence...
April 21, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Modernize Your Data Loss Prevention Str...
The rapid adoption of remote work and transition to the cloud have required many security teams to face a familiar question: are our legacy data loss prevention (DLP) solutions up to the challenge? The short answer: no, they aren’t. In fact, according to a recently released survey by the CyberRisk Alliance, few IT and cybersecurity professionals are confident in their organizations’ ability to protect data against a breach or loss....
April 14, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Using Threat Intelligence to Run a Stro...
Attackers are always looking for unique ways to trick users into clicking on malicious messages, using current events and different lures to evoke strong emotions. The success of a security awareness program depends on staying abreast of the latest tactics and methods used in the threat landscape. Given that, how do you build threat intelligence into your security awareness program? Join us for a 30-minute live demo of Proofpoint Security Awa...
April 7, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Email Fraud Attacks Are on the Rise - W...
According to our 2022 State of the Phish Report, bad actors were very busy in 2021. We saw increases across the board in bulk phishing, targeted attacks and email ransomware attempts along with a 20% increase in Business Email Compromise (BEC) attacks. Led by payroll redirects and supplier invoicing fraud, BEC continues to be an increasing threat. How can companies be on top of their game to protect against these sophisticated attacks? Join us...
March 30, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Start Your People-Centric Security Serv...
When trying to figure out your approach to Security Service Edge (SSE) in your organization, focus on what matters most -- protecting people from threats and stopping sensitive data from going out the door. This does not mean throwing away everything and starting over. People-centric SSE starts with your use cases, and focuses on your people, apps and data. Join Proofpoint’s Brian Reed, Director of Cybersecurity Strategy, for a 30-minute...
March 29, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Balancing Data Loss Prevention with Emp...
The growth in remote and hybrid work provides employees access to data from anywhere and everywhere, helping increase their efficiency. At the same time, this ‘new normal’ also creates more opportunities for data loss, whether unintentional or malicious. In today’s fast paced environment, organizations need to balance the protection of sensitive data through multiple channels with employee productivity. Join us to learn about...
March 24, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Complement Microsoft 365 with an Enterp...
More than ever, organizations know how important it is to have a modern data archive. Companies that use Microsoft 365 often rely on its embedded archiving app, which includes features such as archiving and basic e-discovery. Or they use its upgraded version, which adds advanced search, e-discovery and compliance. But to have a complete archiving solution, you need more. In this 30-minute webinar and live demo, you’ll find out why organi...
March 17, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Behind the Scenes: Stopping Today’s Adv...
Threat actors are using more advanced techniques to attack your people: Compromising supplier accounts, using file-sharing sites, and committing sophisticated email fraud. To stop these advanced phishing threats, detection technology must adapt to these techniques at a rapid pace. And organizations need to take action to proactively protect their people. Join our Threat Protection team in this 30-minute webinar. You will learn about: Today...
March 16, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
State of the Phish Findings in Action
The 2022 State of the Phish Report surfaced some alarming findings from our global survey of 3,500 adults. Only 53% of workers were able to correctly identify the definition of phishing, and 42% of workers took a dangerous action in 2021 (clicking a malicious link, downloading malware, or exposing personal data). Awareness gaps and lax security behaviors can create substantial risk and reinforce the need for tailored security awareness program...
March 15, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Extend Your Platform to the Cloud and Web
Threat actors combine tactics that use email, cloud and the web to compromise users and spread ransomware. To defend against these multi-vector attacks you need multi-vector protections. With a people-centric security solution, you can extend your organization’s protections beyond email to the cloud and web. Join Proofpoint evangelists Ran Schwartz and Michael Jones for a 30-minute demo and learn how to protect against web and cloud thre...
March 8, 2022
Organizer: Proofpoint
Location: Webcast
Add Favorite
Back to Search Begin New Search