www.proofpoint.com
Open in
urlscan Pro
2a02:e980:107::cf
Public Scan
URL:
https://www.proofpoint.com/us/webinars
Submission: On September 14 via api from US — Scanned from DE
Submission: On September 14 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM/us
<form action="/us" data-region="us" data-language="en">
<input type="text" name="search_block_form" placeholder="Search">
<input type="submit">
</form>
<form class="ais-SearchBox-form" action="" role="search" novalidate=""><label for="webinars__filters-keys-search">Search</label><input class="ais-SearchBox-input" type="search" placeholder="Search" maxlength="512"
name="webinars__filters-keys-search"><button class="ais-SearchBox-reset" type="reset" title="Clear the search query." hidden="">
<svg class="ais-SearchBox-resetIcon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20" width="10" height="10">
<path d="M8.114 10L.944 2.83 0 1.885 1.886 0l.943.943L10 8.113l7.17-7.17.944-.943L20 1.886l-.943.943-7.17 7.17 7.17 7.17.943.944L18.114 20l-.943-.943-7.17-7.17-7.17 7.17-.944.943L0 18.114l.943-.943L8.113 10z"></path>
</svg>
</button></form>
Text Content
Skip to main content Products Solutions Partners Resources Company ContactLanguages Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence Proofpoint Essentials Sendmail Support Log-in Main Menu EMAIL SECURITY AND PROTECTION Defend against threats, ensure business continuity, and implement email policies. ADVANCED THREAT PROTECTION Protect against email, mobile, social and desktop threats. SECURITY AWARENESS TRAINING Engage your users and turn them into a strong line of defense against phishing and other cyber attacks. CLOUD SECURITY Defend against threats, protect your data, and secure access. COMPLIANCE AND ARCHIVING Reduce risk, control costs and improve data visibility to ensure compliance. INFORMATION PROTECTION Protect from data loss by negligent, compromised, and malicious users. DIGITAL RISK PROTECTION Protect against digital security risks across web domains, social media and the deep and dark web. PREMIUM SECURITY SERVICES Get deeper insight with on-call, personalized assistance from our expert team. RANSOMWARE HUB Stop ransomware in its tracks with the free research and resources in our Ransomware Hub. Learn More SOLUTIONS BY TOPIC COMBAT EMAIL AND CLOUD THREATS Protect your people from email and cloud threats with an intelligent and holistic approach. CHANGE USER BEHAVIOR Help your employees identify, resist and report attacks before the damage is done. COMBAT DATA LOSS AND INSIDER RISK Prevent data loss via negligent, compromised and malicious insiders by correlating content, behavior and threats. MODERNIZE COMPLIANCE AND ARCHIVING Manage risk and data retention needs with a modern compliance and archiving solution. PROTECT CLOUD APPS Keep your people and their cloud apps secure by eliminating threats, avoiding data loss and mitigating compliance risk. PREVENT LOSS FROM RANSOMWARE Learn about this growing threat and stop attacks by securing today’s top ransomware vector: email. SECURE MICROSOFT 365 Implement the very best security and compliance solution for your Microsoft 365 collaboration suite. DEFEND YOUR REMOTE WORKFORCE WITH CLOUD EDGE Secure access to corporate resources and ensure business continuity for your remote workers. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. SOLUTIONS BY INDUSTRY Federal Government State and Local Government Higher Education Financial Services Healthcare Mobile Operators Internet Service Providers Small and Medium Businesses PARTNER PROGRAMS CHANNEL PARTNERS Become a channel partner. Deliver Proofpoint solutions to your customers and grow your business. ARCHIVE EXTRACTION PARTNERS Learn about the benefits of becoming a Proofpoint Extraction Partner. GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS Learn about our global consulting and services partners that deliver fully managed and integrated solutions. TECHNOLOGY AND ALLIANCE PARTNERS Learn about our relationships with industry-leading firms to help protect your people, data and brand. SOCIAL MEDIA PROTECTION PARTNERS Learn about the technology and alliance partners in our Social Media Protection Partner program. PROOFPOINT ESSENTIALS PARTNER PROGRAMS Small Business Solutions for channel partners and MSPs. PARTNER TOOLS Become a Channel Partner Channel Partner Portal RESOURCE LIBRARY Find the information you're looking for in our library of videos, data sheets, white papers and more. BLOG Keep up with the latest news and happenings in the ever‑evolving cybersecurity landscape. PODCASTS Learn about the human side of cybersecurity. Episodes feature insights from experts and executives. THREAT GLOSSARY Learn about the latest security threats and how to protect your people, data, and brand. EVENTS Connect with us at events to learn how to protect your people and data from ever‑evolving threats. CUSTOMER STORIES Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges. WEBINARS Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity. Watch now to earn your CPE credits SECURITY HUBS Get free research and resources to help you protect against threats, build a security culture, and stop ransomware in its tracks. Threat Hub CISO Hub Cybersecurity Awareness Hub Ransomware Hub Insider Threat Management Hub ABOUT PROOFPOINT Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. CAREERS Stand out and make a difference at one of the world's leading cybersecurity companies. NEWS CENTER Read the latest press releases, news stories and media highlights about Proofpoint. PRIVACY AND TRUST Learn about how we handle data and make commitments to privacy and other regulations. ENVIRONMENTAL, SOCIAL, AND GOVERNANCE Learn about our people-centric principles and how we implement them to positively impact our global community. SUPPORT Access the full range of Proofpoint support services. Learn More English (US) English (UK) English (AU) Español Deutsch Français Italiano Português 日本語 한국어 Products Overview Email Protection Email Fraud Defense Secure Email Relay Threat Response Auto-Pull Sendmail Open Source Essentials for Small Business Overview Targeted Attack Protection in Email Email Isolation Threat Response Emerging Threats Intelligence Overview Assess Change Behavior Evaluate Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web Security Secure Access Overview Automate Capture Patrol Track Archive Discover Supervision Overview Enterprise Data Loss Prevention (DLP) Insider Threat Management Intelligent Classification and Protection Endpoint Data Loss Prevention (DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Overview Social Media Protection Domain Fraud Monitoring Executive and Location Threat Monitoring Overview Technical Account Managers Proofpoint Threat Information Services Managed Services for Security Awareness Training People-Centric Security Program Managed Email Security Managed Services for Information Protection Insider Threat Management Services Compliance and Archiving Services Consultative Services Products Solutions Partners Resources Company English (US) English (UK) English (AU) Español Deutsch Français Italiano Português 日本語 한국어 Login Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence Proofpoint Essentials Sendmail Support Log-in Contact EMAIL SECURITY AND PROTECTION Defend against threats, ensure business continuity, and implement email policies. ADVANCED THREAT PROTECTION Protect against email, mobile, social and desktop threats. SECURITY AWARENESS TRAINING Engage your users and turn them into a strong line of defense against phishing and other cyber attacks. CLOUD SECURITY Defend against threats, protect your data, and secure access. COMPLIANCE AND ARCHIVING Reduce risk, control costs and improve data visibility to ensure compliance. INFORMATION PROTECTION Protect from data loss by negligent, compromised, and malicious users. DIGITAL RISK PROTECTION Protect against digital security risks across web domains, social media and the deep and dark web. PREMIUM SECURITY SERVICES Get deeper insight with on-call, personalized assistance from our expert team. Overview Email Protection Email Fraud Defense Secure Email Relay Threat Response Auto-Pull Sendmail Open Source Essentials for Small Business Overview Targeted Attack Protection in Email Email Isolation Threat Response Emerging Threats Intelligence Overview Assess Change Behavior Evaluate Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web Security Secure Access Overview Automate Capture Patrol Track Archive Discover Supervision Overview Enterprise Data Loss Prevention (DLP) Insider Threat Management Intelligent Classification and Protection Endpoint Data Loss Prevention (DLP) Email Data Loss Prevention (DLP) Email Encryption Data Discover Overview Social Media Protection Domain Fraud Monitoring Executive and Location Threat Monitoring Overview Technical Account Managers Proofpoint Threat Information Services Managed Services for Security Awareness Training People-Centric Security Program Managed Email Security Managed Services for Information Protection Insider Threat Management Services Compliance and Archiving Services Consultative Services RANSOMWARE HUB Stop ransomware in its tracks with the free research and resources in our Ransomware Hub. Learn More SOLUTIONS BY TOPIC COMBAT EMAIL AND CLOUD THREATS Protect your people from email and cloud threats with an intelligent and holistic approach. CHANGE USER BEHAVIOR Help your employees identify, resist and report attacks before the damage is done. COMBAT DATA LOSS AND INSIDER RISK Prevent data loss via negligent, compromised and malicious insiders by correlating content, behavior and threats. MODERNIZE COMPLIANCE AND ARCHIVING Manage risk and data retention needs with a modern compliance and archiving solution. PROTECT CLOUD APPS Keep your people and their cloud apps secure by eliminating threats, avoiding data loss and mitigating compliance risk. PREVENT LOSS FROM RANSOMWARE Learn about this growing threat and stop attacks by securing today’s top ransomware vector: email. SECURE MICROSOFT 365 Implement the very best security and compliance solution for your Microsoft 365 collaboration suite. DEFEND YOUR REMOTE WORKFORCE WITH CLOUD EDGE Secure access to corporate resources and ensure business continuity for your remote workers. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. SOLUTIONS BY INDUSTRY Federal Government State and Local Government Higher Education Financial Services Healthcare Mobile Operators Internet Service Providers Small and Medium Businesses PARTNER PROGRAMS CHANNEL PARTNERS Become a channel partner. Deliver Proofpoint solutions to your customers and grow your business. ARCHIVE EXTRACTION PARTNERS Learn about the benefits of becoming a Proofpoint Extraction Partner. GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS Learn about our global consulting and services partners that deliver fully managed and integrated solutions. TECHNOLOGY AND ALLIANCE PARTNERS Learn about our relationships with industry-leading firms to help protect your people, data and brand. SOCIAL MEDIA PROTECTION PARTNERS Learn about the technology and alliance partners in our Social Media Protection Partner program. PROOFPOINT ESSENTIALS PARTNER PROGRAMS Small Business Solutions for channel partners and MSPs. PARTNER TOOLS Become a Channel Partner Channel Partner Portal RESOURCE LIBRARY Find the information you're looking for in our library of videos, data sheets, white papers and more. BLOG Keep up with the latest news and happenings in the ever‑evolving cybersecurity landscape. PODCASTS Learn about the human side of cybersecurity. Episodes feature insights from experts and executives. THREAT GLOSSARY Learn about the latest security threats and how to protect your people, data, and brand. EVENTS Connect with us at events to learn how to protect your people and data from ever‑evolving threats. CUSTOMER STORIES Read how Proofpoint customers around the globe solve their most pressing cybersecurity challenges. WEBINARS Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity. Watch now to earn your CPE credits SECURITY HUBS Get free research and resources to help you protect against threats, build a security culture, and stop ransomware in its tracks. Threat Hub CISO Hub Cybersecurity Awareness Hub Ransomware Hub Insider Threat Management Hub ABOUT PROOFPOINT Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. WHY PROOFPOINT Today’s cyber attacks target people. Learn about our unique people-centric approach to protection. CAREERS Stand out and make a difference at one of the world's leading cybersecurity companies. NEWS CENTER Read the latest press releases, news stories and media highlights about Proofpoint. PRIVACY AND TRUST Learn about how we handle data and make commitments to privacy and other regulations. ENVIRONMENTAL, SOCIAL, AND GOVERNANCE Learn about our people-centric principles and how we implement them to positively impact our global community. SUPPORT Access the full range of Proofpoint support services. Learn More Zeigen Sie weiterhin Inhalte für Ihren Standort an United StatesUnited KingdomFranceDeutschlandEspaña日本AustraliaItaliaFortsetzen Webinars FEATURED WEBINAR STILL THE ONE: PROTECTING EMAIL, THE ONCE AND FUTURE #1 THREAT VECTOR Featuring: Gartner and Proofpoint -- Today’s threat landscape is evolving quickly. It is characterized by advanced and costly attacks like BEC, ransomware and data loss. And attackers continue to use email-based ... Read More tactics like phishing, impersonation, and social engineering to launch these damaging attacks. So how can you stay ahead? Read Less Watch Now Search All People CentricArchivingCloud App SecurityBusiness and Email Account CompromiseSecurity Awareness TrainingInsider Threat ManagementDigital RiskZero-Trust Network AccessBrowse by Topic All People Centric Archiving Cloud App Security Business and Email Account Compromise Security Awareness Training Insider Threat Management Digital Risk Zero-Trust Network Access All WebinarsLive DemosCPE CoursesBrowse by Type All Webinars Live Demos CPE Courses * Upcoming Webinars * On Demand Webinars MITIGATE RISK FROM INSIDER THREATS: INSIGHTS & ADVICE Wed, September 14, 2022 5:00 PM GMT (UTC +00:00) Insider threats are a top concern for CISOs. Remote work, cloud adoption, and employee turnover have created a perfect storm for organizations trying to protect their most strategic and sensitive data. Understanding the ... Read More best response to careless, malicious, and compromised users is imperative to managing insider threats and helping your organization minimize brand and financial damage. Read Less Attend REDUCE BREACHES WITH TARGETED EDUCATION AND THREAT INTELLIGENCE DATA Thu, September 15, 2022 5:00 PM GMT (UTC +00:00) Effective security awareness programs strive to reduce user risk and breaches. To achieve this, it’s essential to prepare your users to face real-world threats, educate them on security best practices, and analyze ... Read More metrics to determine future changes and improvements. Join us for a 30-minute live demo of Proofpoint’s Security Awareness Training platform. Read Less Attend MAKING E-DISCOVERY EASIER TO IMPROVE LITIGATION READINESS Tue, September 20, 2022 4:00 PM GMT (UTC +00:00) Responding to e-discovery requests or internal investigations can be difficult. It comes as no surprise that research from Enterprise Strategy Group (ESG)1 highlights how nearly 40% of organizations say “satisfying ... Read More e-discovery requests is harder now than it was two years ago.” But it doesn’t have to be, if you have the right e-discovery technology, with features that can help speed performance, streamline workflows and reduce costs. Join us for a 30-minute demo to see e-discovery experts navigating our easy-to-use e-discovery user interface which can help you improve your litigation readiness. Read Less Attend ENABLE PEOPLE-CENTRIC ACCESS TO WEB AND CLOUD APPS Wed, September 21, 2022 5:00 PM GMT (UTC +00:00) Policies used by organizations to control access to cloud and web applications are typically static and designed to serve large groups of users. To better prevent sophisticated threats and sensitive data loss, ... Read More organizations must be able to set intelligent web browsing policies that take into account individual users’ risk posture. Join us for a 30-minute live demo of how to create adaptive user policies and deploy people-centric access control for cloud and web apps. Read Less Attend THE YEAR CYBERSECURITY WENT PRIME TIME: 2022 VOICE OF THE CISO Thu, September 22, 2022 5:00 PM GMT (UTC +00:00) In our second annual Voice of the CISO report, Proofpoint surveyed 1,400 CISOs from around the world, inviting them to share their firsthand accounts of the past 12 months and offer insights for the future. This year’s ... Read More edition is packed with new CISO insights including data points on ransomware and insider threats, the impact of The Great Resignation, and the associated information protection challenges facing organizations today. Read Less Attend Load More Upcoming Webinars UNDERSTANDING THE IMPACTS OF CYBER ATTACKS ON PATIENT CARE Recorded on: Tue, September 13, 2022 Cybersecurity can have a large impact on both patient safety and care delivery. As cyber attacks have become more sophisticated, they are creating new challenges for healthcare organizations and potentially lead to more ... Read More disastrous consequences. In this session Ryan Witt, Industries Solutions and Strategy leader at Proofpoint, will examine the cybersecurity threats targeting healthcare organizations, and the cost of responding to attacks that can endanger the patient. Read Less Watch Now DEEP DIVE INTO THE LATEST CLOUD THREATS IN MICROSOFT ENVIRONMENTS Recorded on: Wed, September 7, 2022 According to the Verizon Data Breach Report of 2022, credentials are the number one type of data that attackers are after. Microsoft 365 apps are involved in a number of the latest cloud attacks and risks in 2022. Watch Now DECREASE INSIDER RISK FROM CARELESS USERS WITH SECURITY AWARENESS Recorded on: Tue, August 30, 2022 The shift to remote work, accelerated cloud adoption, and increased use of personal devices have created challenges for organizations trying to protect their most strategic data. As a result, insider threats have ... Read More increased by 44% over the past two years.1 In fact, the biggest portion of insider-related incidents are attributed to careless users. The most effective way to educate users on their risky behavior and their role in protecting the organization’s data starts with security awareness. Read Less Watch Now REIMAGING SECURITY AWARENESS: GO BEYOND TRAINING AND COMPLIANCE Recorded on: Thu, August 25, 2022 More than 70% of organizations conduct formal security awareness training. And yet, only 53% of working adults know what Phishing is. Can you tell how effective your security awareness program is? The goal of every ... Read More security awareness training program is to drive real security outcomes such as less successful phishing incidents, fewer people falling for email scams. To achieve this goal, organizations need to go beyond compliance check-boxing and awareness training. Security professionals should start building a strong security culture that empowers end users and helps drive behavior change. Read Less Watch Now LEVELING UP BEC & RANSOMWARE PROTECTION Recorded on: Tue, August 23, 2022 Business Email Compromise (BEC) losses are up 51% year-over-year according to the FBI Crime Report. Additionally, Ransomware is surging, with more than double the number of incidents reported. It takes a defense-in-depth ... Read More defense-in-depth approach to reduce the risk of these popular threats. By understanding the current threats and your organization’s risk, you can successfully mitigate BEC and Ransomware threats before they become a problem. Read Less Watch Now A STRATEGY TO PROTECT DATA FROM WEB-DELIVERED CLOUD THREATS Recorded on: Wed, August 17, 2022 Organizations continue to struggle adapting their security strategies to the cloud and a very dynamic threat landscape. Join Proofpoint Product Marketing leaders, Brian Gleeson and Sai Chavali for a 30-minute webinar as ... Read More they discuss a new survey conducted by the Cloud Security Alliance on how businesses are adapting to cloud and web threats in the new normal. Read Less Watch Now FINDING ACTIONABLE INSIGHTS WITH ADVANCED THREAT PROTECTION Recorded on: Thu, August 4, 2022 In order to fully understand your most advanced threats and the actions you should be taking against them, you must go beyond standard threat reporting with more in-depth detail and forensics. By combining world-class ... Read More threat data, detection, and research, the Targeted Attack Protection (TAP) Threat Insight Dashboard can uncover the advanced insights you need to take action and continually improve your security posture. Read Less Watch Now INVESTIGATE AND RESPOND TO INSIDER THREATS WITH SPEED AND ACCURACY Recorded on: Tue, August 2, 2022 Remote work, cloud adoption, and employee turnover have created challenges for organizations trying to protect their most strategic and sensitive data. In fact, according to the 2022 Voice of the CISO report, insider ... Read More threats are the top concern for CISOs globally. This, in turn, requires security teams to investigate and respond quickly to insider-led incidents to prevent financial and reputational damage. Read Less Watch Now MOVING BEYOND COMPLIANCE IN YOUR SECURITY PROGRAM Recorded on: Tue, August 2, 2022 In the past 10 years, security awareness has grown from a concept that some organizations thought about, to a major focus and compliance requirement meant to combat the rise in people-targeted attacks. While deploying ... Read More training simulations, and analyzing reporting is a great start, successful security programs depend on user engagement and behavior change. Want to up-level your security program but not sure where to start?. Read Less Watch Now WHY DEFAULT MICROSOFT 365 EMAIL SECURITY IS NOT ENOUGH AGAINST TODAY’S ADVANCED THREATS Recorded on: Thu, July 28, 2022 In an increasingly remote workplace email security is a top priority, especially as today’s attackers are looking to exploit human nature, not just vulnerabilities. In the 2022 Verizon Data Breach Investigators Report ... Read More they found 82 percent of breaches involved a human element, with only a small percentage of breaches involving technical vulnerabilities. During this webinar we will explore how to you choose a solution that works for this essential threat vector. Read Less Watch Now Load More On-Demand Webinars ABOUT * Overview * Why Proofpoint * Careers * Leadership Team * News Center * Nexus Platform * Privacy and Trust THREAT CENTER * Threat Hub * Cybersecurity Awareness Hub * Ransomware Hub * Threat Glossary * Threat Blog * Daily Ruleset PRODUCTS * Email Security & Protection * Advanced Threat Protection * Security Awareness Training * Cloud Security * Archive & Compliance * Information Protection * Digital Risk Protection * Product Bundles RESOURCES * White Papers * Webinars * Data Sheets * Events * Customer Stories * Blog * Free Trial CONNECT * +1-408-517-4710 * Contact Us * Office Locations * Request a Demo SUPPORT * Support Login * Support Services * IP Address Blocked? * Facebook * Twitter * linkedin * Youtube * English (US) * English (UK) * English (AU) * Español * Deutsch * Français * Italiano * Português * 日本語 * 한국어 © 2022. All rights reserved. Terms and conditions Privacy Policy Sitemap