33 episodes

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.

Protecting Peopl‪e‬ Proofpoint

    • Marketing
    • 4.7 • 22 Ratings

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.

    #ExpertInsights 7: Gretel Egan Breaks Down the 2021 State of the Phish Report

    #ExpertInsights 7: Gretel Egan Breaks Down the 2021 State of the Phish Report

    We’ve been joined by Gretel Egan, Senior Security Awareness Training Strategist at Proofpoint, to discuss this year’s State of the Phish (SOTP) Report, where we get an in depth look at user awareness, vulnerability and resilience.


    This episode covers:

    - A breakdown of what goes into the SOTP report and where the data is sourced from

    - The broadness of the term ‘phishing’ and what it includes or means, in the context of the data

    - The application of phishing techniques across different media

    - How the COVID-19 pandemic gave attackers the opportunity of a lifetime

    - How to measure informational security preparedness and awareness within your organization

    - The resilience ratio, and how automated reporting can improve this figure for your organization


    Below is the link to access this year’s State of the Phish Report:

    - The 2021 SOTP Report


    Find additional content and subscribe to Protecting People on Apple Podcasts, Spotify, or our website.


    Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.

    • 35 min
    #ExpertInsights 6: Protect Your Employees from Tax-Related Phishing

    #ExpertInsights 6: Protect Your Employees from Tax-Related Phishing

    When everyone is feeling overwhelmed by taxes and afraid of doing something wrong, that’s when the phishing, smishing, and website impersonation reaches its height.


    How can we reassure and train our employees about tax-related scams?


    In this episode of our Expert Insights series, we interview Susan Mackowiak, Senior Director, Program Content at Proofpoint, about resources to avoid being a victim of a tax scam.


    What we talked about:

    - What scammers are trying to accomplish

    - How the IRS contacts you and how to contact the IRS

    - An overview of the contents of Proofpoint’s Tax Awareness Kit


    Check out these resources we mentioned during the podcast:

    - Tax Season Awareness Kit

    - 7th Annual Report for the State of the Phish

    - The IRS’s phishing reporting site


    Find additional content and subscribe to Protecting People on Apple Podcasts, Spotify, or our website.


    Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.

    • 19 min
    The Inside Line on Information Protection: Putting People at the Center of Information Protection

    The Inside Line on Information Protection: Putting People at the Center of Information Protection

    If you’re asking which information protection platform to choose, that’s not deep enough. It’s intellectually lazy.
    Too often, we make technology decisions instead of programmatic decisions.
    In a recent episode in our Inside Line on Information Protection series, we chatted with cybersecurity executive Jeremy Wittkop about reimagining DLP as a method for protecting people first.
    We also talked about:

    Why technology solutions don’t help CSOs discuss data protection
    Multilingual services, behavioral analytics, and resource distribution
    IT budgets and security budgets are not the same
    Genuinely measuring and analyzing risk

    Resources we mentioned during the podcast:

    Activate Your Brain by Scott G. Halford
    How to Measure Anything in Cybersecurity Risk by Hubbard and Seiersen

    Find additional content and subscribe to Protecting People on Apple Podcasts, Spotify, or our website.
    Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.

    • 32 min
    #ExpertInsights 5: Looking Ahead at 2021: Information Governance & Regulatory Changes

    #ExpertInsights 5: Looking Ahead at 2021: Information Governance & Regulatory Changes

    When we’re looking ahead at 2021 in information governance and regulatory changes, what will define the cybersecurity industry?

    In this second of two episodes featuring regulatory changes in our Expert Insights series, John Pepe, Resident Chief Compliance Officer and Regulatory Counsel at Proofpoint, and Sonali Bhavsar, technology executive, forecast governance in 2021.

    What we talked about:

    - The importance of voice as a data footprint

    - What to supervise for remote workers

    - The challenge of creating a use case with archiving, supervision, and behavior analytics all as separate products

    - Expectations on the regulatory side, plus new technologies

    - Machine learning for entity mapping

    Find additional content and subscribe to Protecting People on Apple Podcasts, Spotify, or our website.

    Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.

    • 33 min
    The Inside Line on Information Protection: Insider Threat Protection: What You Should Know

    The Inside Line on Information Protection: Insider Threat Protection: What You Should Know

    In addition to focusing on malicious actors trying to gain access to your networks and your systems, are you just as focused on making sure that the people who already have access are doing what they’re supposed to be doing?

    Insider Threat detection is one of the most underutilized, but overlooked aspects of any cybersecurity organization.

    On this episode of The Inside Line on Information Protection, we talk with Larry Ponemon about:

    - Why every company regardless of size, should be running Insider Threat programs

    - The astronomical cost of Insider Threat investigations

    - Why good people making silly mistakes may be more damaging that bad actors doing bad things

    - The easiest way into a Fortune 50 company (it’s probably not what you think)

    Find additional content and subscribe to Protecting People on Apple Podcasts, Spotify, or our website.

    Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.

    • 16 min
    Introducing The Inside Line on Information Protection

    Introducing The Inside Line on Information Protection

    Introducing our new series: Inside Line on Information Protection.

    In this show, we’ll welcome expert guests with diverse backgrounds in information protection to discuss topics like insider threat, information governance, and cloud security.
    In this inaugural episode, host Brian Reed is joined by Catherine Hwang, Director of Product Marketing for Information Protection Products at Proofpoint.

    What we talked about:

    - The topics that will be covered in the series

    - Why legacy DLP solutions aren’t solving customer challenges

    - Wanting to solve more than one problem at a time with DLP budgets

    Find additional content and subscribe to Protecting People on Apple Podcasts, Spotify, or our website.

    Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.

    • 8 min

Customer Reviews

4.7 out of 5
22 Ratings

22 Ratings

MBailey84 ,

Great cyber security insights

A lot of different angles covered here especially around threats. Like the variety of guests and topics while still keeping the focus on attacks ultimately targeting people.

Top Podcasts In Marketing

Listeners Also Subscribed To