www.proofpoint.com Open in urlscan Pro
2a02:e980:107::cf  Public Scan

URL: https://www.proofpoint.com/us/webinars
Submission: On September 14 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

/us

<form action="/us" data-region="us" data-language="en">
  <input type="text" name="search_block_form" placeholder="Search">
  <input type="submit">
</form>

<form class="ais-SearchBox-form" action="" role="search" novalidate=""><label for="webinars__filters-keys-search">Search</label><input class="ais-SearchBox-input" type="search" placeholder="Search" maxlength="512"
    name="webinars__filters-keys-search"><button class="ais-SearchBox-reset" type="reset" title="Clear the search query." hidden="">
    <svg class="ais-SearchBox-resetIcon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20" width="10" height="10">
      <path d="M8.114 10L.944 2.83 0 1.885 1.886 0l.943.943L10 8.113l7.17-7.17.944-.943L20 1.886l-.943.943-7.17 7.17 7.17 7.17.943.944L18.114 20l-.943-.943-7.17-7.17-7.17 7.17-.944.943L0 18.114l.943-.943L8.113 10z"></path>
    </svg>
  </button></form>

Text Content

Skip to main content
Products Solutions Partners Resources Company ContactLanguages
Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence
Proofpoint Essentials Sendmail Support Log-in
Main Menu

EMAIL SECURITY AND PROTECTION

Defend against threats, ensure business continuity, and implement email
policies.

ADVANCED THREAT PROTECTION

Protect against email, mobile, social and desktop threats.

SECURITY AWARENESS TRAINING

Engage your users and turn them into a strong line of defense against phishing
and other cyber attacks.

CLOUD SECURITY

Defend against threats, protect your data, and secure access.

COMPLIANCE AND ARCHIVING

Reduce risk, control costs and improve data visibility to ensure compliance.

INFORMATION PROTECTION

Protect from data loss by negligent, compromised, and malicious users.

DIGITAL RISK PROTECTION

Protect against digital security risks across web domains, social media and the
deep and dark web.

PREMIUM SECURITY SERVICES

Get deeper insight with on-call, personalized assistance from our expert team.


RANSOMWARE HUB

Stop ransomware in its tracks with the free research and resources in our
Ransomware Hub.

Learn More


SOLUTIONS BY TOPIC

COMBAT EMAIL AND CLOUD THREATS

Protect your people from email and cloud threats with an intelligent and
holistic approach.

CHANGE USER BEHAVIOR

Help your employees identify, resist and report attacks before the damage is
done.

COMBAT DATA LOSS AND INSIDER RISK

Prevent data loss via negligent, compromised and malicious insiders by
correlating content, behavior and threats.

MODERNIZE COMPLIANCE AND ARCHIVING

Manage risk and data retention needs with a modern compliance and archiving
solution.

PROTECT CLOUD APPS

Keep your people and their cloud apps secure by eliminating threats, avoiding
data loss and mitigating compliance risk.

PREVENT LOSS FROM RANSOMWARE

Learn about this growing threat and stop attacks by securing today’s top
ransomware vector: email.

SECURE MICROSOFT 365

Implement the very best security and compliance solution for your Microsoft 365
collaboration suite.

DEFEND YOUR REMOTE WORKFORCE WITH CLOUD EDGE

Secure access to corporate resources and ensure business continuity for your
remote workers.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.


SOLUTIONS BY INDUSTRY

Federal Government State and Local Government Higher Education Financial
Services Healthcare Mobile Operators Internet Service Providers Small and Medium
Businesses


PARTNER PROGRAMS

CHANNEL PARTNERS

Become a channel partner. Deliver Proofpoint solutions to your customers and
grow your business.

ARCHIVE EXTRACTION PARTNERS

Learn about the benefits of becoming a Proofpoint Extraction Partner.

GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS

Learn about our global consulting and services partners that deliver fully
managed and integrated solutions.

TECHNOLOGY AND ALLIANCE PARTNERS

Learn about our relationships with industry-leading firms to help protect your
people, data and brand.

SOCIAL MEDIA PROTECTION PARTNERS

Learn about the technology and alliance partners in our Social Media Protection
Partner program.

PROOFPOINT ESSENTIALS PARTNER PROGRAMS

Small Business Solutions for channel partners and MSPs.


PARTNER TOOLS

Become a Channel Partner Channel Partner Portal

RESOURCE LIBRARY

Find the information you're looking for in our library of videos, data sheets,
white papers and more.

BLOG

Keep up with the latest news and happenings in the ever‑evolving cybersecurity
landscape.

PODCASTS

Learn about the human side of cybersecurity. Episodes feature insights from
experts and executives.

THREAT GLOSSARY

Learn about the latest security threats and how to protect your people, data,
and brand.

EVENTS

Connect with us at events to learn how to protect your people and data from
ever‑evolving threats.

CUSTOMER STORIES

Read how Proofpoint customers around the globe solve their most pressing
cybersecurity challenges.

WEBINARS

Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.

Watch now to earn your CPE credits


SECURITY HUBS

Get free research and resources to help you protect against threats, build a
security culture, and stop ransomware in its tracks.

Threat Hub
CISO Hub
Cybersecurity Awareness Hub
Ransomware Hub
Insider Threat Management Hub

ABOUT PROOFPOINT

Proofpoint is a leading cybersecurity company that protects organizations'
greatest assets and biggest risks: their people.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.

CAREERS

Stand out and make a difference at one of the world's leading cybersecurity
companies.

NEWS CENTER

Read the latest press releases, news stories and media highlights about
Proofpoint.

PRIVACY AND TRUST

Learn about how we handle data and make commitments to privacy and other
regulations.

ENVIRONMENTAL, SOCIAL, AND GOVERNANCE

Learn about our people-centric principles and how we implement them to
positively impact our global community.


SUPPORT

Access the full range of Proofpoint support services.

Learn More
English (US) English (UK) English (AU) Español Deutsch Français Italiano
Português 日本語 한국어
Products
Overview Email Protection Email Fraud Defense Secure Email Relay Threat Response
Auto-Pull Sendmail Open Source Essentials for Small Business
Overview Targeted Attack Protection in Email Email Isolation Threat Response
Emerging Threats Intelligence
Overview Assess Change Behavior Evaluate
Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web
Security Secure Access
Overview Automate Capture Patrol Track Archive Discover Supervision
Overview Enterprise Data Loss Prevention (DLP) Insider Threat Management
Intelligent Classification and Protection Endpoint Data Loss Prevention (DLP)
Email Data Loss Prevention (DLP) Email Encryption Data Discover
Overview Social Media Protection Domain Fraud Monitoring Executive and Location
Threat Monitoring
Overview Technical Account Managers Proofpoint Threat Information Services
Managed Services for Security Awareness Training People-Centric Security Program
Managed Email Security Managed Services for Information Protection Insider
Threat Management Services Compliance and Archiving Services Consultative
Services
Products Solutions Partners Resources Company
English (US) English (UK) English (AU) Español Deutsch Français Italiano
Português 日本語 한국어
Login
Support Log-in Digital Risk Portal Email Fraud Defense ET Intelligence
Proofpoint Essentials Sendmail Support Log-in
Contact


EMAIL SECURITY AND PROTECTION

Defend against threats, ensure business continuity, and implement email
policies.

ADVANCED THREAT PROTECTION

Protect against email, mobile, social and desktop threats.

SECURITY AWARENESS TRAINING

Engage your users and turn them into a strong line of defense against phishing
and other cyber attacks.

CLOUD SECURITY

Defend against threats, protect your data, and secure access.

COMPLIANCE AND ARCHIVING

Reduce risk, control costs and improve data visibility to ensure compliance.

INFORMATION PROTECTION

Protect from data loss by negligent, compromised, and malicious users.

DIGITAL RISK PROTECTION

Protect against digital security risks across web domains, social media and the
deep and dark web.

PREMIUM SECURITY SERVICES

Get deeper insight with on-call, personalized assistance from our expert team.

Overview Email Protection Email Fraud Defense Secure Email Relay Threat Response
Auto-Pull Sendmail Open Source Essentials for Small Business
Overview Targeted Attack Protection in Email Email Isolation Threat Response
Emerging Threats Intelligence
Overview Assess Change Behavior Evaluate
Overview Browser Isolation Cloud Account Defense Cloud App Security Broker Web
Security Secure Access
Overview Automate Capture Patrol Track Archive Discover Supervision
Overview Enterprise Data Loss Prevention (DLP) Insider Threat Management
Intelligent Classification and Protection Endpoint Data Loss Prevention (DLP)
Email Data Loss Prevention (DLP) Email Encryption Data Discover
Overview Social Media Protection Domain Fraud Monitoring Executive and Location
Threat Monitoring
Overview Technical Account Managers Proofpoint Threat Information Services
Managed Services for Security Awareness Training People-Centric Security Program
Managed Email Security Managed Services for Information Protection Insider
Threat Management Services Compliance and Archiving Services Consultative
Services


RANSOMWARE HUB

Stop ransomware in its tracks with the free research and resources in our
Ransomware Hub.

Learn More


SOLUTIONS BY TOPIC

COMBAT EMAIL AND CLOUD THREATS

Protect your people from email and cloud threats with an intelligent and
holistic approach.

CHANGE USER BEHAVIOR

Help your employees identify, resist and report attacks before the damage is
done.

COMBAT DATA LOSS AND INSIDER RISK

Prevent data loss via negligent, compromised and malicious insiders by
correlating content, behavior and threats.

MODERNIZE COMPLIANCE AND ARCHIVING

Manage risk and data retention needs with a modern compliance and archiving
solution.

PROTECT CLOUD APPS

Keep your people and their cloud apps secure by eliminating threats, avoiding
data loss and mitigating compliance risk.

PREVENT LOSS FROM RANSOMWARE

Learn about this growing threat and stop attacks by securing today’s top
ransomware vector: email.

SECURE MICROSOFT 365

Implement the very best security and compliance solution for your Microsoft 365
collaboration suite.

DEFEND YOUR REMOTE WORKFORCE WITH CLOUD EDGE

Secure access to corporate resources and ensure business continuity for your
remote workers.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.


SOLUTIONS BY INDUSTRY

Federal Government State and Local Government Higher Education Financial
Services Healthcare Mobile Operators Internet Service Providers Small and Medium
Businesses


PARTNER PROGRAMS

CHANNEL PARTNERS

Become a channel partner. Deliver Proofpoint solutions to your customers and
grow your business.

ARCHIVE EXTRACTION PARTNERS

Learn about the benefits of becoming a Proofpoint Extraction Partner.

GLOBAL SYSTEM INTEGRATOR (GSI) AND MANAGED SERVICE PROVIDER (MSP) PARTNERS

Learn about our global consulting and services partners that deliver fully
managed and integrated solutions.

TECHNOLOGY AND ALLIANCE PARTNERS

Learn about our relationships with industry-leading firms to help protect your
people, data and brand.

SOCIAL MEDIA PROTECTION PARTNERS

Learn about the technology and alliance partners in our Social Media Protection
Partner program.

PROOFPOINT ESSENTIALS PARTNER PROGRAMS

Small Business Solutions for channel partners and MSPs.


PARTNER TOOLS

Become a Channel Partner Channel Partner Portal

RESOURCE LIBRARY

Find the information you're looking for in our library of videos, data sheets,
white papers and more.

BLOG

Keep up with the latest news and happenings in the ever‑evolving cybersecurity
landscape.

PODCASTS

Learn about the human side of cybersecurity. Episodes feature insights from
experts and executives.

THREAT GLOSSARY

Learn about the latest security threats and how to protect your people, data,
and brand.

EVENTS

Connect with us at events to learn how to protect your people and data from
ever‑evolving threats.

CUSTOMER STORIES

Read how Proofpoint customers around the globe solve their most pressing
cybersecurity challenges.

WEBINARS

Browse our webinar library to learn about the latest threats, trends and issues
in cybersecurity.

Watch now to earn your CPE credits


SECURITY HUBS

Get free research and resources to help you protect against threats, build a
security culture, and stop ransomware in its tracks.

Threat Hub
CISO Hub
Cybersecurity Awareness Hub
Ransomware Hub
Insider Threat Management Hub

ABOUT PROOFPOINT

Proofpoint is a leading cybersecurity company that protects organizations'
greatest assets and biggest risks: their people.

WHY PROOFPOINT

Today’s cyber attacks target people. Learn about our unique people-centric
approach to protection.

CAREERS

Stand out and make a difference at one of the world's leading cybersecurity
companies.

NEWS CENTER

Read the latest press releases, news stories and media highlights about
Proofpoint.

PRIVACY AND TRUST

Learn about how we handle data and make commitments to privacy and other
regulations.

ENVIRONMENTAL, SOCIAL, AND GOVERNANCE

Learn about our people-centric principles and how we implement them to
positively impact our global community.


SUPPORT

Access the full range of Proofpoint support services.

Learn More
Zeigen Sie weiterhin Inhalte für Ihren Standort an
United StatesUnited KingdomFranceDeutschlandEspaña日本AustraliaItaliaFortsetzen
Webinars


FEATURED WEBINAR


STILL THE ONE: PROTECTING EMAIL, THE ONCE AND FUTURE #1 THREAT VECTOR





Featuring: Gartner and Proofpoint -- Today’s threat landscape is evolving
quickly. It is characterized by advanced and costly attacks like BEC, ransomware
and data loss. And attackers continue to use email-based ... Read More tactics
like phishing, impersonation, and social engineering to launch these damaging
attacks. So how can you stay ahead? Read Less

Watch Now
Search
All People CentricArchivingCloud App SecurityBusiness and Email Account
CompromiseSecurity Awareness TrainingInsider Threat ManagementDigital
RiskZero-Trust Network AccessBrowse by Topic
All
People Centric
Archiving
Cloud App Security
Business and Email Account Compromise
Security Awareness Training
Insider Threat Management
Digital Risk
Zero-Trust Network Access
All WebinarsLive DemosCPE CoursesBrowse by Type
All
Webinars
Live Demos
CPE Courses
 * Upcoming Webinars
 * On Demand Webinars


MITIGATE RISK FROM INSIDER THREATS: INSIGHTS & ADVICE



Wed, September 14, 2022 5:00 PM GMT (UTC +00:00)

Insider threats are a top concern for CISOs. Remote work, cloud adoption, and
employee turnover have created a perfect storm for organizations trying to
protect their most strategic and sensitive data. Understanding the ... Read More
best response to careless, malicious, and compromised users is imperative to
managing insider threats and helping your organization minimize brand and
financial damage. Read Less

Attend


REDUCE BREACHES WITH TARGETED EDUCATION AND THREAT INTELLIGENCE DATA



Thu, September 15, 2022 5:00 PM GMT (UTC +00:00)

Effective security awareness programs strive to reduce user risk and breaches.
To achieve this, it’s essential to prepare your users to face real-world
threats, educate them on security best practices, and analyze ... Read More
metrics to determine future changes and improvements.  Join us for a 30-minute
live demo of Proofpoint’s Security Awareness Training platform.  Read Less

Attend


MAKING E-DISCOVERY EASIER TO IMPROVE LITIGATION READINESS



Tue, September 20, 2022 4:00 PM GMT (UTC +00:00)

Responding to e-discovery requests or internal investigations can be difficult.
It comes as no surprise that research from Enterprise Strategy Group (ESG)1
highlights how nearly 40% of organizations say “satisfying ... Read More
e-discovery requests is harder now than it was two years ago.” But it doesn’t
have to be, if you have the right e-discovery technology, with features that can
help speed performance, streamline workflows and reduce costs.   Join us for a
30-minute demo to see e-discovery experts navigating our easy-to-use e-discovery
user interface which can help you improve your litigation readiness. Read Less

Attend


ENABLE PEOPLE-CENTRIC ACCESS TO WEB AND CLOUD APPS



Wed, September 21, 2022 5:00 PM GMT (UTC +00:00)

Policies used by organizations to control access to cloud and web applications
are typically static and designed to serve large groups of users. To better
prevent sophisticated threats and sensitive data loss, ... Read More
organizations must be able to set intelligent web browsing policies that take
into account individual users’ risk posture.  Join us for a 30-minute live demo
of how to create adaptive user policies and deploy people-centric access control
for cloud and web apps.  Read Less

Attend


THE YEAR CYBERSECURITY WENT PRIME TIME: 2022 VOICE OF THE CISO



Thu, September 22, 2022 5:00 PM GMT (UTC +00:00)

In our second annual Voice of the CISO report, Proofpoint surveyed 1,400 CISOs
from around the world, inviting them to share their firsthand accounts of the
past 12 months and offer insights for the future. This year’s ... Read More
edition is packed with new CISO insights including data points on ransomware and
insider threats, the impact of The Great Resignation, and the associated
information protection challenges facing organizations today. Read Less

Attend
Load More Upcoming Webinars


UNDERSTANDING THE IMPACTS OF CYBER ATTACKS ON PATIENT CARE



Recorded on: Tue, September 13, 2022

Cybersecurity can have a large impact on both patient safety and care delivery.
As cyber attacks have become more sophisticated, they are creating new
challenges for healthcare organizations and potentially lead to more ... Read
More disastrous consequences. In this session Ryan Witt, Industries Solutions
and Strategy leader at Proofpoint, will examine the cybersecurity threats
targeting healthcare organizations, and the cost of responding to attacks that
can endanger the patient. Read Less

Watch Now


DEEP DIVE INTO THE LATEST CLOUD THREATS IN MICROSOFT ENVIRONMENTS



Recorded on: Wed, September 7, 2022

According to the Verizon Data Breach Report of 2022, credentials are the number
one type of data that attackers are after. Microsoft 365 apps are involved in a
number of the latest cloud attacks and risks in 2022.

Watch Now


DECREASE INSIDER RISK FROM CARELESS USERS WITH SECURITY AWARENESS



Recorded on: Tue, August 30, 2022

The shift to remote work, accelerated cloud adoption, and increased use of
personal devices have created challenges for organizations trying to protect
their most strategic data. As a result, insider threats have ... Read More
increased by 44% over the past two years.1 In fact, the biggest portion of
insider-related incidents are attributed to careless users. The most effective
way to educate users on their risky behavior and their role in protecting the
organization’s data starts with security awareness. Read Less

Watch Now


REIMAGING SECURITY AWARENESS: GO BEYOND TRAINING AND COMPLIANCE



Recorded on: Thu, August 25, 2022

More than 70% of organizations conduct formal security awareness training. And
yet, only 53% of working adults know what Phishing is. Can you tell how
effective your security awareness program is? The goal of every ... Read More
security awareness training program is to drive real security outcomes such as
less successful phishing incidents, fewer people falling for email scams. To
achieve this goal, organizations need to go beyond compliance check-boxing and
awareness training. Security professionals should start building a strong
security culture that empowers end users and helps drive behavior change. Read
Less

Watch Now


LEVELING UP BEC & RANSOMWARE PROTECTION



Recorded on: Tue, August 23, 2022

Business Email Compromise (BEC) losses are up 51% year-over-year according to
the FBI Crime Report. Additionally, Ransomware is surging, with more than double
the number of incidents reported. It takes a defense-in-depth ... Read More
defense-in-depth approach to reduce the risk of these popular threats. By
understanding the current threats and your organization’s risk, you can
successfully mitigate BEC and Ransomware threats before they become a problem.
Read Less

Watch Now


A STRATEGY TO PROTECT DATA FROM WEB-DELIVERED CLOUD THREATS



Recorded on: Wed, August 17, 2022

Organizations continue to struggle adapting their security strategies to the
cloud and a very dynamic threat landscape. Join Proofpoint Product Marketing
leaders, Brian Gleeson and Sai Chavali for a 30-minute webinar as ... Read More
they discuss a new survey conducted by the Cloud Security Alliance on how
businesses are adapting to cloud and web threats in the new normal. Read Less

Watch Now


FINDING ACTIONABLE INSIGHTS WITH ADVANCED THREAT PROTECTION



Recorded on: Thu, August 4, 2022

In order to fully understand your most advanced threats and the actions you
should be taking against them, you must go beyond standard threat reporting with
more in-depth detail and forensics. By combining world-class ... Read More
threat data, detection, and research, the Targeted Attack Protection (TAP)
Threat Insight Dashboard can uncover the advanced insights you need to take
action and continually improve your security posture. Read Less

Watch Now


INVESTIGATE AND RESPOND TO INSIDER THREATS WITH SPEED AND ACCURACY



Recorded on: Tue, August 2, 2022

Remote work, cloud adoption, and employee turnover have created challenges for
organizations trying to protect their most strategic and sensitive data. In
fact, according to the 2022 Voice of the CISO report, insider ... Read More
threats are the top concern for CISOs globally. This, in turn, requires security
teams to investigate and respond quickly to insider-led incidents to prevent
financial and reputational damage. Read Less

Watch Now


MOVING BEYOND COMPLIANCE IN YOUR SECURITY PROGRAM



Recorded on: Tue, August 2, 2022

In the past 10 years, security awareness has grown from a concept that some
organizations thought about, to a major focus and compliance requirement meant
to combat the rise in people-targeted attacks. While deploying ... Read More
training simulations, and analyzing reporting is a great start, successful
security programs depend on user engagement and behavior change. Want to
up-level your security program but not sure where to start?. Read Less

Watch Now


WHY DEFAULT MICROSOFT 365 EMAIL SECURITY IS NOT ENOUGH AGAINST TODAY’S ADVANCED
THREATS



Recorded on: Thu, July 28, 2022

In an increasingly remote workplace email security is a top priority, especially
as today’s attackers are looking to exploit human nature, not just
vulnerabilities. In the 2022 Verizon Data Breach Investigators Report ... Read
More they found 82 percent of breaches involved a human element, with only a
small percentage of breaches involving technical vulnerabilities. During this
webinar we will explore how to you choose a solution that works for this
essential threat vector. Read Less

Watch Now
Load More On-Demand Webinars


ABOUT

 * Overview
 * Why Proofpoint
 * Careers
 * Leadership Team
 * News Center
 * Nexus Platform
 * Privacy and Trust


THREAT CENTER

 * Threat Hub
 * Cybersecurity Awareness Hub
 * Ransomware Hub
 * Threat Glossary
 * Threat Blog
 * Daily Ruleset


PRODUCTS

 * Email Security & Protection
 * Advanced Threat Protection
 * Security Awareness Training
 * Cloud Security
 * Archive & Compliance
 * Information Protection
 * Digital Risk Protection
 * Product Bundles


RESOURCES

 * White Papers
 * Webinars
 * Data Sheets
 * Events
 * Customer Stories
 * Blog
 * Free Trial


CONNECT

 * +1-408-517-4710
 * Contact Us
 * Office Locations
 * Request a Demo


SUPPORT

 * Support Login
 * Support Services
 * IP Address Blocked?

 * Facebook
 * Twitter
 * linkedin
 * Youtube

 * English (US)
 * English (UK)
 * English (AU)
 * Español
 * Deutsch
 * Français
 * Italiano
 * Português
 * 日本語
 * 한국어

© 2022. All rights reserved. Terms and conditions Privacy Policy Sitemap