New Perimeters
HUMAN-CENTRIC CYBERSECURITY
Put people at the center – protect them against threat, impersonation, identity and data loss risks.
P E R I O D I C A L F O R T H E P R O O F P O I N T C U S T O M E R C O M M U N I T Y I S S U E 7 / 2 0 2 4
Human-Centric Security Put people at the center - protect them against threat, impersonation, identity and data loss risks.
CONTENTS
WELCOME
PROTECTING PEOPLE - THE SIGNIFICANCE OF HUMAN-CENTRIC CYBERSECURITY
THREAT RISK
STOPPING INITIAL COMPROMISE
THE
STAGES OF THE RANSOMWARE ATTACK CHAIN
IMPERSONATION RISK
THE RISKY BUSINESS OF SUPPLY CHAIN THREATS
DATA LOSS RISK
MISDIRECTED EMAIL.
COMMON, COSTLY - BUT EASY
IDENTITY RISK
STOP THREAT ACTORS IN THEIR TRACKS - PREVENT PRIVILEGE ESCALATION AND LATERAL MOVEMENT
QUANTIFYING CYBER RISK
BEYOND SECURITY AWARENESS - AN INTEGRATED HUMAN-CENTRIC APPROACH
AI AND LARGE LANGUAGE MODELS: GAME-CHANGING TECH OR OVER-HYPED?
PUTTING IT INTO PRACTISE
HOW OUR CUSTOMERS PROTECT PEOPLE AND DEFEND DATA
ACCO BRANDS MAKES EMAIL SECURITY A STRATEGIC PRIORITY WITH PROOFPOINT
INSIDER THREAT VISIBILITY
REDUCING RISK AND GAINING EFFICIENCY
DEFENDING AGAINST DATA LOSS AND MITIGATING INSIDER THREATS
CRITICAL QUESTIONS TO ASK YOUR CYBERSECURITY VENDOR
PROTECT PEOPLE AND DEFEND DATA WITH PROOFPOINT CYBERSECURITY PACKAGES
USEFUL CONTACT DETAILS