<p><span class="color-class-blue" style="font-size:0.5em;">New Perimeters </span></p><p><span class="" style="font-size:0.9em;">Identity is the New Attack Surface</span></p>
<p><b><span style="font-size:0.7em;">Break the attack chain with insight into your vulnerable and risky identities</span></b></p><p><span style="font-size:1.0em;">-----------------------------------------------<br></span><b><span style="font-size:0.7em;">Threat spotlight </span></b></p><p><span style="font-size:0.5em;">Break the attack chain by detecting and preventing identity risk</span><span style="font-size:0.9em;"><br>-----------------------------------------------------</span></p><p><b><span style="font-size:0.7em;">Customer spotlight</span></b><span style="font-size:0.7em;"> </span></p><p><span style="font-size:0.5em;">Day in the life of a Business Information Security Analyst </span><span style="font-size:0.9em;"><br>-----------------------------------------------------</span></p><p><b><span style="font-size:0.7em;">Point of view </span></b><br><span style="font-size:0.5em;">A CISO perspective on identity threat</span></p><p> </p><p><span style="color:rgb(46,60,81);"><span style="font-size:0.5em;">PERIODICAL FOR THE PROOFPOINT CUSTOMER COMMUNITY </span></span><span style="font-size:0.9em;"><br></span><span style="color:rgb(46,60,81);"><span style="font-size:0.5em;">ISSUE 6 / SUMMER 2023</span></span></p>
ISSUE 6 / SUMMER 2023
Contents
<p><b><span style="font-size:1.6em;">Contents</span></b></p>
<p><b><span style="font-size:1.6em;">Welcome</span></b></p>
<p><b><span style="font-size:1.6em;">Protect the new attack surface. Break the attack chain.</span></b></p>
<p><b><span class="color-class-white" style="font-size:1.4em;">Not all vulnerabilities are created equal</span></b></p>
<p><b><span style="font-size:0.5em;">Point of view: </span></b></p><p> </p><p><b><span style="font-size:1.5em;">A CISO perspective on identity threat </span></b></p>
<p><b><span style="font-size:0.5em;">Threat spotlight: </span></b></p><p> </p><p><b><span style="font-size:1.5em;">Break the attack chain with Identity Threat Defense</span></b></p>
<p><span style="font-size:0.6em;">Customer spotlight: </span></p><p><br><b><span style="font-size:1.5em;">A day in the life of a Business Information Security Analyst</span></b></p>
<p><span style="color:#ffffff;"><span style="font-size:0.5em;">Discover your risky identities </span></span></p>
<p><b><span style="font-size:0.5em;">The State of the Phish: </span></b></p><p> </p><p><span class="color-class-teal" style="font-size:1.8em;">Improving cyber-resilience</span></p>
<p><b><span style="font-size:0.5em;">Customer story: </span></b></p><p> </p><p><b><span class="" style="font-size:1.4em;">General auto finance company expands vulnerability program to encompass identity risks</span></b></p>
<p><b><span style="font-size:0.5em;">Customer story: </span></b></p><p> </p><p><b><span style="font-size:1.5em;">Bank assesses identity risk to complete merger and acquisition (M&A) safely</span></b></p>
<p><b><span style="font-size:1.6em;">6 questions on the power of partnership</span></b></p>
<p><b><span style="font-size:1.6em;">Did you know?</span></b></p>
Thank you for reading New Perimeters: Issue 6 | Proofpoint | Magazine
Created with Sketch.