How to Fight Targeted Attacks

Proofpoint's Kevin Epstein on How to Protect the Targets
How to Fight Targeted Attacks

Proofpoint and ISMG have just completed a new Targeted Attacks survey. What are some of the key findings? Kevin Epstein shares insight on detecting advanced threats and warding off attacks.

See Also: Fencing an Imaginary Yard; How to Secure your IP with an Unidentifiable Network Perimeter

Phishing, Trojans and malvertising are the most common forms of attack. And despite significant security investments, organizations continue to be breached because of mistakes made by employees and partners, says Epstein, VP Advanced Security & Governance, Proofpoint.

In a video interview recorded at RSA 2014, Epstein discusses:

  • Results of the new Targeted Attacks Study;
  • How to address the human factor;
  • Effective security solutions to ward off advanced threats.

Epstein directs Proofpoint's global product marketing initiatives. He is also a lecturer at Stanford University and author of the popular trade book, Marketing Made Easy (Entrepreneur Magazine Press). Prior to joining Proofpoint, he was VP Marketing at Drobo (Data Robotics, Inc.), a prosumer and SMB storage appliance company; served as an executive at CloudShare, a cloud computing and virtualization SaaS company; was an Executive in Residence (XIR) at Mohr Davidow Ventures; and served as the Vice President of Marketing and Products at Scalent Systems. Prior to that, he founded VMware's outbound marketing organization.

About the Author

Tom Field

Tom Field

Vice President - Editorial, ISMG

Field is an award-winning journalist with over 30 years experience in newspapers, magazines, books, events and electronic media. A veteran community journalist with extensive business/technology and international reporting experience, Field joined ISMG in 2007 and currently oversees the editorial operations for all of ISMG's global media properties. An accomplished public speaker, Field has developed and moderated scores of podcasts, webcasts, roundtables and conferences, and he has appeared at RSA Conference and on various C-SPAN, The History Channel and Travel Channel television programs.

Around the Network