Proofpoint

KEEP CALM & STAY SECURE: 

Virtual Webinars & Events
Connect with us on webinars and at events to learn how to protect your people and data from ever-evolving threats.

LIVE WEBINARS


November 18, 2020 at 12:00 PM ET 
Next Generation Archiving and Compliance
IT departments are plagued by data growth and a pressure to roll out new communication platforms such as Slack, Teams and more. And their legal and compliance teams struggle with how to best capture, manage and retain that content in compliance with corporate policies and evolving regulations. And they are struggling with inefficiencies in their e-discovery and supervision processes. Join Proofpoint archiving and compliance experts to learn how to capture, manage and retain digital communications with confidence.

ON-DEMAND WEBINARS


CASB                  
ITM image .png
Stop Cloud Threats by Leveraging CASB
Learn how Proofpoint’s CASB solution takes a people-centered approach to safeguard you from account compromise, oversharing of data, and compliance risks in the cloud.
FBI Interview   
psat image.png
Interview with Proofpoint & the FBI
In this interactive Q&A discussion, hear from retired FBI agent Scott Augenbaum and Proofpoint’s Ryan Kalember as they discuss the current threat landscapes and the FBI prospective on cybercrime.  
ITM image .png
Secure Access for Your Increasingly Mobile Workforce
As apps move to the cloud and workers are increasingly mobile, enterprises need a better approach to providing remote access than site-centric VPN. Learn how Proofpoint secures your network in the age of cloud and worker mobility.
Security Awareness   
psat image.png
Teach Your Employees Secure Behavior with Security Awareness Training
Engage your users and turn them into a strong line of defense against phishing and other cyber-attacks with Security awareness training. With over 90% of attacks targeting people it’s critical to teach your employees secure behavior. 
Insider Threats        
ITM image .png
Looking Within: The Hidden Costs of Insider Threats
52% of data breaches are insider driven – and the cost has doubled in the last three years. ObserveIT Insider Threat Management (ITM) empowers security teams to detect Insider Threats, streamline their investigations and protect against data loss.
BEC and EAC         
email image .png
Do's and Don'ts for Business Email Compromise (BEC) & Email Account Compromise (EAC) 
The financial losses associated with Business Email Compromise (BEC) and Email Account Compromise (EAC) continue to rise. The FBI reported losses of almost $1.7B in 2019 alone. So how can you better manage this billion-dollar problem in your organization? Learn how Proofpoint can help your organization mitigate BEC risks.

Section 3: Speakers

Use h4 for subhead

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vestibulum placerat tellus, et tincidunt mi accumsan sit amet.

Use h4 for subhead

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vestibulum placerat tellus, et tincidunt mi accumsan sit amet.

Use h4 for subhead

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vestibulum placerat tellus, et tincidunt mi accumsan sit amet.

Use h4 for subhead

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vestibulum placerat tellus, et tincidunt mi accumsan sit amet.

Use h4 for subhead

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vestibulum placerat tellus, et tincidunt mi accumsan sit amet.

Use h4 for subhead

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vestibulum placerat tellus, et tincidunt mi accumsan sit amet.

Use h4 for subhead

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vestibulum placerat tellus, et tincidunt mi accumsan sit amet.

Use h4 for subhead

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nunc vestibulum placerat tellus, et tincidunt mi accumsan sit amet.

Security Awareness CPE Webinars

Choose any webinar below to earn your CPE credit. After watching a session, you may submit for your credit here.

Archive, Compliance & Digital Risk CPE Webinars

Choose any webinar below to earn your CPE credit. After watching a session, you may submit for your credit here.

Section 7: Additional Content

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Section 8: Additional Content

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

© 2020 All Rights Reserved. Privacy Policy