Frost & Sullivan

Always OnDemand
Because Your Time is Short

People-centric Security for Today’s Threat Landscape

The UnWebinar Series

Attackers target threats toward your people more than ever. Today’s top cybersecurity risks – ransomware, business email compromise and data loss – are all people-driven. It’s time defenders adapt a security strategy to focus on the biggest risk – people.

Defending Against the Attacker’s Platform

Social engineering, phishing, impersonation, malware, compromised accounts, data loss…are all part of the attacker’s platform. Attackers mix and match these tactics for people-centric exploitation. How can we, as defenders, protect our people from the attacker’s platform?

  • Multi-faceted cyber threats faced by businesses
  • Significant impact and cost of cyber-attacks on businesses
    • Loss of monetary assets and IP
    • Loss of credentials leading to greater risks
    • Disruption of business operations
    • Loss of reputation
  • An effective layered defense / defense in depth approach leveraging on technology can help to mitigate these risks

Measuring People Risk

People-centric security requires understanding what your people risk is. How do you measure people risk? How does understanding who your most attacked, vulnerable, and privileged people are help u better prioritize and focus security efforts?

  • Landscape is increasingly complex given supply chain risk and evolving work environment (due to remote work)
  • Risk is irrevocably linked to people and the access they have to an organization’s assets / data; the chain is only as strong as its weakest link
  • Need for identification of high risk / vulnerable profiles and the risks / threats which they face, for implementation of appropriate controls
  • Relationship between People Risk and Zero Trust; segmentation and access control is only one part of the equation. There is a need for awareness and education.

Using the Threat Landscape to Elevate your Organization’s Security Focus (for Smarter Security Awareness)

Everyone sees the benefits of a robust security awareness program. Without understanding the specific threats targeting your organization and people, your security awareness program may be missing the mark. How do you use the threat landscape to elevate your security awareness efforts?

  • Critical role of Threat Intelligence in cyber security defense
  • Using intelligence on the Threat Landscape to mitigate your people risks and setting the direction for security awareness
  • Reframing the awareness program to drive change in end user behaviors (security awareness is a hygiene factor, stakeholder ownership)
  • Need for human conditioning through simulating phishing attacks, raising alertness of users with email tagging, providing channels for user reporting of threats

Surviving the Cybersecurity Skills Shortage

The cybersecurity talent gap is a people-centric security challenge. More threats and not enough skilled people create opportunities for attackers to succeed. How can security teams survive the cybersecurity skills shortage? How can we help security teams be faster and smarter?

  • Pace and sophistication of attacks is increasing. Critical need for effective and efficient solutions to counter threats
  • Key is to implement automation through adoption of a holistic solution and proven technologies. This will help mitigate the risks due to gaps in Cybersecurity skills/ talent
  • Highlight of security technologies/ solutions/ services for automation to augment your capabilities
  • Partnering with the right vendor to bring in the right skill sets and knowledge is also critical

Tune in to the topics that interest you most – always available to view at your leisure!

People Security

Already Registered? Log In Now

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Register

"*" indicates required fields

Name*
Select the Episode(s) you'd like to watch:*

This webinar is co-hosted in partnership with Frost & Sullivan and Proofpoint. As a result, both Proofpoint and Frost & Sullivan are collecting your personal data when you submit such information as part of the registration process above. For more information on each party’s privacy practices, please see: Proofpoint Privacy Statement | Frost & Sullivan Privacy Notice.

Frost & Sullivan may use your personal data to inform you about its products, services and events.
This field is for validation purposes and should be left unchanged.

Our Panel of Cybersecurity Leaders

Richard Wong

Moderator
Richard Wong
SVP – Global Head of Security Advisory Practice
Frost & Sullivan

Cheryl Tang

Cheryl Tang
Sr. Director, Product Marketing
Proofpoint

Brian Reed

Brian Reed
Sr. Director, Cybersecurity Strategy
Proofpoint

In collaboration with

In Collaboraqtion with ProofPoint

Moderator

Richard Wong

Richard Wong
SVP – Global Head of Security Advisory Practice
Frost & Sullivan

Our Panel of Cybersecurity Leaders

Cheryl Tang

Cheryl Tang
Sr. Director, Product Marketing
Proofpoint

Cheryl Tang is the Director of Product Marketing for Proofpoint’s email security product. She has over 20 years of product marketing experience in the enterprise security and IT market and has launched numerous security and technology products and services.

Brian Reed

Brian Reed
Sr. Director, Cybersecurity Strategy
Proofpoint

Brian Reed is our Cybersecurity Evangelist at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics – cloud security, data security, incident response, insider threats and security awareness.

In collaboration with

In Collaboration with ProofPoint