How to Fight Targeted Attacks
Proofpoint's Kevin Epstein on How to Protect the TargetsProofpoint and ISMG have just completed a new Targeted Attacks survey. What are some of the key findings? Kevin Epstein shares insight on detecting advanced threats and warding off attacks.
See Also: Webinar | Identity Crisis: How to Combat Session Hijacking and Credential Theft with MDR
Phishing, Trojans and malvertising are the most common forms of attack. And despite significant security investments, organizations continue to be breached because of mistakes made by employees and partners, says Epstein, VP Advanced Security & Governance, Proofpoint.
In a video interview recorded at RSA 2014, Epstein discusses:
- Results of the new Targeted Attacks Study;
- How to address the human factor;
- Effective security solutions to ward off advanced threats.
Epstein directs Proofpoint's global product marketing initiatives. He is also a lecturer at Stanford University and author of the popular trade book, Marketing Made Easy (Entrepreneur Magazine Press). Prior to joining Proofpoint, he was VP Marketing at Drobo (Data Robotics, Inc.), a prosumer and SMB storage appliance company; served as an executive at CloudShare, a cloud computing and virtualization SaaS company; was an Executive in Residence (XIR) at Mohr Davidow Ventures; and served as the Vice President of Marketing and Products at Scalent Systems. Prior to that, he founded VMware's outbound marketing organization.
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.