Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Proofpoint GmbH
Forums it-sa Expo 2023 Knowledge Forum A

Break the Attack Chain: Strengthen Protective Measures and Protect Employees

You'll gain a deeper understanding of proactive strategies you can implement to protect your organization and break the attack chain.

calendar_today Thu, 12.10.2023, 10:45 - 11:00

event_available On site

place Hall 6, Booth 6-111

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Awareness / Phishing / Fraud Data security / DLP / Know-how protection

Event

This action is part of the event Forums it-sa Expo 2023

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

People are the primary targets of today’s advanced attacks. But most organizations aren’t centering their security strategy around their people. It is critical to align protection with risks targeting users throughout the attack chain—from initial compromise to lateral movement to impact.
In this talk, you'll gain a deeper understanding of both the evolving threat landscape and proactive strategies you can implement to protect your organization and break the attack chain at every stage.

Stop Email Attacks and the Initial Compromise
Email is the number one attack vector in the world today. Threat actors target and exploit your people with phishing, malware, and social engineering-based attacks. That’s why it’s time to take action. Time to mitigate advanced email threats, prevent initial access, and break the attack chain.

Prevent Privilege Identity Escalation and Detecting Lateral Movement
Identity vulnerabilities have been a key attack vector in over 90% of cyber threats and 100% of organizations have them. It’s important to know how to prevent privileged identity risks and stop lateral movement in action.

Defend Against Data Loss and Insider Threats
External and insider threats to data have become more prevalent with the adoption of hybrid work and cloud storage. A people-centric approach to information protection is required to break the attack chain and protect intellectual property and other sensitive data from compromised and malicious users. It's important to align protection with the risks users face throughout the attack chain - from initial compromise to lateral movement to the attackers' ultimate goal of data exfiltration. Get an overview of the dynamic threat landscape and proactive strategies to protect your business and break the attack chain at every stage.
... read more

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.