Categories: Security

Cybersecurity: The human factor

Social engineering and myths about attacks targeting your employees and your data.

As ultra-digitized processes dominate enterprises, and as the era of remote working dawns, your email, cloud services, collaboration suite and your supply chain are all exposed and vulnerable to cyberattacks. Critically for all businesses considering their overall digital security, the weakest link in your cybersecurity continues to be in the human factor.

In this webinar with experts from Proofpoint, you’ll learn about the latest social engineering cyberattacks, the best strategies for a People-Centric Security Model, and the solutions to protect your company from ransomware, data breaches, compliance issues and reputation crises.


Speakers:
Ed Rowley |  Director of Technical Sales | Proofpoint

Ed Rowley has worked in Cybersecurity since 1999 for several Security vendors in a variety of roles including positions in Marketing, Technical Support, Product Management and Sales Engineering.

Dan Marley-Cook | Manager, Sales Engineering, UK | Proofpoint

Language graduate who has worked in IT for 12 years and Cybersecurity for 5, progressing from Sales Engineer through to the Manager of Sales Engineering.


Lucia Rey

Recent Posts

Genesys Series | Empowering Contact Centres: Innovations in AI-Driven CX

In this webinar series, we explore how Genesys, a global leader in call centre technology,…

16 hours ago

Britain’s Biggest Business Show is back for a golden 50th edition, returning to the ExCeL in London on the 13th & 14th of November!

Are you looking to launch a new business or scale your current one? For over…

1 month ago

Empowering SMEs with Pleo: The Ultimate Guide to Optimize Financial Efficiency

 Are you ready to transform your spend management and streamline your financial processes?   …

2 months ago

Future of Microsoft 365 Data Protection

In today's digital landscape, the threat of cyberattacks and data loss events in Microsoft 365…

3 months ago

Your Definitive Guide to Successful Workload Migrations

Join cyber resilience and recovery expert Sam Nicholls for an exclusive session highlighting what your…

3 months ago

Transform Your Business with Efficient Indirect Tax Compliance

Join Our Must-Attend Webinar!   Managing the intricate web of invoicing regulations for cross-border transactions…

4 months ago