Protect 2021 Threat Protection Sessions

Practitioner's Session: Supercharge your Threat Protection Program with Integration

Practitioner's Session: Supercharge your Threat Protection Program with Integration

How you integrate the components of your threat protection program can be the difference between a go-kart or a Ferrari. Learn how to configure and use integrations between Targeted Attack Protection, Isolation and Security Awareness Training to supercharge your security program.

 

Speakers:

  • Colleen Gaffney - Manager, PSAT Managed Services, Proofpoint
  • Ted Roberts - Sr. Professional Services Consultant, Proofpoint
Watch Now
   
Strategies for Stopping Business Email Compromise Attacks

Strategies for Stopping Business Email Compromise Attacks

Business Email Compromise (BEC) comes in many forms: gift card scams, payroll diversion schemes, supplier invoicing fraud and more. Regardless of the attack type, BEC leads the pack in cybercrime losses – nearly $2B in 2020. Join this customer session to gain insights on how to prevent BEC attacks.

 

Speakers:

  • Chris Ard - CISO, Newmont
  • Arin Tufts - Sr. Security Analyst, Newmont
  • Sara Pan - Sr. Product Marketing Manager, Proofpoint
Watch Now
   
Best Practices for Preventing Account Takeover

Best Practices for Preventing Account Takeover

As organizations shift to the cloud, stolen credentials become the new currency for cyber criminals. Credential phishing attacks lead to compromised accounts, which exposes your organization to greater risk. Join this session to learn how a Proofpoint customer is defending against account takeover.

 

Speaker:

  • John Tziortzis - Director of Cyber Security and Enterprise Systems, Centennial College
  • Brett Shaw - Sr. Product Marketing Manager, Proofpoint
Watch Now
   
Practitioner’s Session: Preventing Business Email Compromise and Email Account Compromise

Practitioner’s Session: Preventing Business Email Compromise and Email Account Compromise

Whether by spoofing an identity (BEC) or stealing a valid identity (EAC), attackers’ use of identity deception is on the rise. Learn actions and configurations you can implement with Proofpoint to protect your people from BEC and EAC.

 

Speakers:

  • Mike Olden - Principal Professional Services Consultant, Proofpoint
  • Mike Beninda - Principal Professional Services Consultant, Proofpoint
Watch Now