Video

How to Fight Targeted Attacks

Proofpoint's Kevin Epstein on How to Protect the Targets
How to Fight Targeted Attacks

Proofpoint and ISMG have just completed a new Targeted Attacks survey. What are some of the key findings? Kevin Epstein shares insight on detecting advanced threats and warding off attacks.

See Also: Core Elements of Modern Workforce Identity Security

Phishing, Trojans and malvertising are the most common forms of attack. And despite significant security investments, organizations continue to be breached because of mistakes made by employees and partners, says Epstein, VP Advanced Security & Governance, Proofpoint.

In a video interview recorded at RSA 2014, Epstein discusses:

  • Results of the new Targeted Attacks Study;
  • How to address the human factor;
  • Effective security solutions to ward off advanced threats.

Epstein directs Proofpoint's global product marketing initiatives. He is also a lecturer at Stanford University and author of the popular trade book, Marketing Made Easy (Entrepreneur Magazine Press). Prior to joining Proofpoint, he was VP Marketing at Drobo (Data Robotics, Inc.), a prosumer and SMB storage appliance company; served as an executive at CloudShare, a cloud computing and virtualization SaaS company; was an Executive in Residence (XIR) at Mohr Davidow Ventures; and served as the Vice President of Marketing and Products at Scalent Systems. Prior to that, he founded VMware's outbound marketing organization.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.