Protect 2022
Welcome to Proofpoint Protect 2022. In a new world of advanced security threats and compliance risks, one thing remains the same. Attackers target people. And their techniques have evolved to become broader and more integrated over time. This makes it increasingly important to protect your people and your data.
Join us at Protect 2022 to learn how you can tap into the power of Proofpoint to counter modern attacks and protect against compliance violations.
Why attend Proofpoint Protect 2022?
- Hear compelling keynotes from Proofpoint executives and industry experts
- Discover how top cybersecurity and compliance professionals are protecting their organizations and people with Proofpoint products
- Learn about new Proofpoint products that will accelerate your journey to people-centric security and compliance
- Learn how to access and apply data insights to fortify your cybersecurity and compliance posture
- Discuss with fellow top CISOs trends and best practices, such as engaging with the board of directors and cyber insurance
Thank you for your submission.
Featured Speakers
Guest Speaker:
Earvin "Magic" Johnson
Chairman & CEO, Magic Johnson Enterprises
Ashan Willy
Chief Executive Officer, Proofpoint
Ryan Kalember
EVP, Cybersecurity Strategy, Proofpoint
John Katko
U.S. Congressman
Dr. Chenxi Wang
Founder & General Partner, Rain Capital Investment
Davis Hake
Co-Founder and Vice President of Policy, Resilience
Lucia Milică
JD, Global Resident CISO, Proofpoint
Patrick Gaul
Executive Director, National Technology Security Coalition
Stewart Room
Global Head of Data Protection, Privacy and Cyber Security Legal, Strategy and Consulting Services, DWF Law LLP
Tracks
Innovations and Platforms to Protect You. Plan your experience at Protect 2022.
Information and Cloud Security
Remote work and adoption of cloud applications are driving concerns around data loss and cloud security. Join us for a mix of roadmap, customer panels, and demonstrations of new innovations for our solutions to protect your information in a work-from-anywhere world.
- Get a roadmap of people-centric Proofpoint Enterprise Data Loss Prevention and Security Services Edge
- Hear from panels featuring customers and experts discussing strategies and best practices
- See how to tackle key use cases with fast time to value
Threat Protection
The Threat Protection track brings together Proofpoint customers and product leaders to explore the evolving threat landscape and best practices to defend against threats such as ransomware, business email compromise, cloud account compromise, and malware. Featuring a mix of customer sessions and product overviews, you get real-world insights and advice on protecting the No.1 threat vector.
- Preview Proofpoint Threat Protection product strategy and roadmap
- Hear from customers about their email and cloud security strategies
- Explore how integrating controls can supercharge your security
- Join practitioner sessions covering practical implementation of email security controls
Compliance
We now live in a world where most interactions will remain virtual, and employees continue to work remotely. Are you prepared for the volume and diversity in the types of digital communications that require your attention—from both a regulatory and legal perspective? The Proofpoint Compliance Platform is here to help.
- Learn how our Intelligent Compliance roadmap is helping you stay aligned with what is needed to stay compliant and with legal protection
- Hear from industry experts and Proofpoint customers on trends in the compliance landscape
- Join hands-on sessions that show the power of the Proofpoint Compliance Platform
CISO / Thought Leadership
Join other information security leaders in thought-provoking topics that CISOs face in today’s complex world. You’ll gain a wealth of best practices and leadership advice on better ways to mitigate risk and protect your most valuable asset—your people.
- Learn about best practices for interacting with the company board of directors
- Hear from fellow CISOs on trends in the regulatory landscape and cyber insurance
- See how to use a people-centric framework to understand risk and reduce it within your organization
- Learn about our findings from our annual Voice of the CISO report
Agenda
Day 1
10:00AM - 10:10AM
Protect Opening Message
10:10AM - 10:25AM
Proofpoint Welcome Keynote with Ashan Willy, CEO
Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks.
10:25AM - 10:55AM
The Proofpoint Platforms vs. The Attacker's Platform
Ryan Kalember, EVP, Cybersecurity Strategy, Proofpoint
Sherrod DeGrippo, VP, Threat Research & Protection, Proofpoint
CE Credits: 0.50
With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms.
10:55AM - 11:05AM
Break and Updates
11:05AM - 11:30AM
Customer Panel - Protecting Against the Threat and Risk Actor's Platform
Deneen DeFiore, Vice President & Chief Information Security Officer, United Airlines
Kris Burkhardt, Chief Information Security Officer, Accenture
Ashan Willy , CEO, Proofpoint
CE Credits: 0.25
Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people.
11:30AM - 11:55AM
Customer Panel - Reducing Risk in Information Loss and Cloud Threats
Guy Delp, Vice President – Global Information Security, Pfizer Inc.
Robert McIntyre – Director of Information Security, Information Security, Tetra Pak
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group, Proofpoint
CE Credits: 0.25
With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk.
11:55AM - 12:00PM
Break and Updates
12:00PM - 12:30PM
Cybersecurity Outlook in Washington, DC with U.S. Congressman John Katko
John Katko, U.S. Congressman (R-NY)
Patrick Gaul, Executive Director, National Technology Security Coalition
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cybersecurity policy is a hot topic these days as Congress and the administration consider a host of legislative and regulatory proposals. Join us as we hear an insider’s perspective from U.S. Congressman John Katko, Ranking Member of the House Committee on Homeland Security, about the bills and regulations that will impact our industry and around the world.
12:30PM - 12:35PM
Break and Updates
12:35PM - 12:55PM
Fireside Chat with Earvin "Magic" Johnson
Earvin “Magic” Johnson, Chairman & CEO, Magic Johnson Enterprises
Ashan Willy , CEO, Proofpoint
Our Protect guest speaker will be announced shortly
12:55PM - 1:00PM
Closing Session
Day 2
10:00AM - 1:15PM
Content Tracks
10:00AM - 10:05AM
Welcome to Protect - Day 2
10:05AM - 10:50AM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
10:50AM - 10:55AM
Break
10:55AM - 11:25AM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
11:25AM - 11:30AM
Break
11:30AM - 12:00PM
Extending Threat and Data Loss Controls to the New Cloud Edge
Albert Attias, Dir. of Enterprise Security, Workday
Simon Horn, CISO, Ray White
Brian Reed, Director of Cybersecurity Strategy, Proofpoint
CE Credits: 0.50
Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them.
12:00PM - 12:05PM
Break
12:05PM - 12:35PM
Reducing Data Loss & Insider Risk with Everyone Working Remote and Adopting Cloud Apps
Russ Gordon - CISO, BorgWarner
Stacy Knoup - Director of Engineering, Principal Financial Group
Jeremy Wittkop - Senior Director, Technology Services, PCMS
CE Credits: 0.50
Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data.
12:35PM - 12:40PM
Break
12:40PM - 1:10PM
Practitioner's session: Implementing key use cases with the Proofpoint Platform to Reduce Data Loss
Erich Anderson, Senior Professional Services Consultant, Proofpoint
Mike Olden, Principal Professional Services Consultant, Proofpoint
CE Credits: 0.50
Join our PS Principal Consultants to discuss how to implement several common use cases for the Proofpoint Information Protection Platform. These use cases will cover used by Proofpoint's CASB, Email DLP, and ITM offerings.
1:10PM - 1:15PM
Closing Session
10:00AM - 10:05AM
Welcome to Protect - Day 2
10:05AM - 10:50AM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
10:50AM - 10:55AM
Break
10:55AM - 11:25AM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
11:25AM - 11:30AM
Break
11:30AM - 12:00PM
Countering the Attacker's Platform with the Proofpoint Platform
James Case, CISO, Baptist Health
Giles Ring, Director of Cybersecurity, Virginia Credit Union
Mike Bailey, Manager, Product Marketing Proofpoint
CE Credits: 0.50
Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats.
12:00PM - 12:05PM
Break
12:05PM - 12:35PM
Expanding Defenses with Email Authentication
Gary Masters, System Director - Cybersecurity Engineering, Common Spirit Health
Craig Temple, Senior Product Marketing Manager, Proofpoint
CE Credits: 0.50
Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners.
12:35PM - 12:40PM
Break
12:40PM - 1:10PM
Practitioner's session: Updates in Best Practices for Threat Protection and New Product Features
Michael Beninda, Principal Professional Services Consultant
Matt Lyle, Professional Services Architect
CE Credits: 0.50
Join our Professional Services architect and principal consultant to discuss recent updates in general Best Practices as well as recommendations around new product features.
1:10PM - 1:15PM
Closing Session
10:00AM - 10:05AM
Welcome to Protect - Day 2
10:05AM - 10:50AM
Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap
Ashan Willy,CEO, Proofpoint
Darren Lee, EVP/GM, Compliance and Digital Risk Business Unit, Proofpoint
Jeremiah Ness, Engineering Director, Proofpoint
Rick Dales, VP Product Management, Compliance, Proofpoint
When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection
10:50AM - 10:55AM
Break
10:55AM - 11:25AM
Compliance & Legal Trends in 2022
Deb Tater, VP, Legal & Compliance IT, Metlife
George Tziahanas, MD, Managing Director, Information Governance, Breakwater Solutions
John Pepe, Resident CCO & Regulatory Counsel, Proofpoint
CE Credits: 0.50
In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond.
11:25AM - 11:30AM
Break
11:30AM - 12:00PM
Regulatory Guidance on Compliance
Debbie Reynolds- "The Data Diva", CEO & Chief Data Privacy Officer, Debbie Reynolds Consulting LLC
Michael Rutty, Senior Product Marketing Manager, Proofpoint
CE Credits: 0.50
Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats.
12:00PM - 12:05PM
Break
12:05PM - 12:35PM
Technologies Impacting Litigation Readiness
Phil Favro, eDiscovery and InfoGov Consultant, Innovative Driven
Shawn Aquino, Manager, Product Marketing, Proofpoint
CE Credits: 0.50
Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations.
12:35PM - 12:40PM
Break
12:40PM - 1:10PM
Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products
Raymond McGrath, Manager, Professional Services, Proofpoint
Alexander Boyd, Principal Consultant, Proofpoint
CE Credits: 0.50
Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform.
1:10PM - 1:15PM
Closing Session
10:00AM - 10:05AM
Welcome to Protect - Day 2
10:05AM - 10:50AM
Voice of the CISO report
Malcom Norman, Chief Information Security Officer, Wood
Patrick Joyce, Vice President of Information Technology and Chief Information Security Officer, Medtronic
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams.
10:50AM - 10:55AM
Break
10:55AM - 11:25AM
What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE)
Arthur Zavalkovsky, Director of Product Management, Proofpoint
Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure.
11:25AM - 11:30AM
Break
11:30AM - 12:00PM
Strategies for Board Engagement
Deborah Wheeler, Chief Information Security Officer, Delta Airlines
Dr. Chenxi, Founder & General Partner, Rain Capital Investment
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk.
12:00PM - 12:05PM
Break
12:05PM - 12:35PM
Regulatory landscape in 2022
Stewart Room, Global Head of Data Protection, Privacy and Cyber Security Legal, Strategy and Consulting Services, DWF Law LLP
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators.
12:35PM - 12:40PM
Break
12:40PM - 1:10PM
CISO perspective on cyber insurance
Davis Hake,Co-Founder and Vice President of Policy, Resilience
Mandy Huth, VP of Cybersecurity, Kohler
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging.
Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience?
1:10PM - 1:15PM
Closing Session
Day 1
Session
10:00AM - 10:10AM
Protect Opening Message
10:10AM - 10:25AM
Proofpoint Welcome Keynote with Ashan Willy, CEO
Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks.
10:25AM - 10:55AM
The Proofpoint Platforms vs. The Attacker's Platform
Ryan Kalember, EVP, Cybersecurity Strategy, Proofpoint
Sherrod DeGrippo, VP, Threat Research & Protection, Proofpoint
CE Credits: 0.50
With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms.
10:55AM - 11:05AM
Break and Updates
11:05AM - 11:30AM
Customer Panel - Protecting Against the Threat and Risk Actor's Platform
Deneen DeFiore, Vice President & Chief Information Security Officer, United Airlines
Kris Burkhardt, Chief Information Security Officer, Accenture
Ashan Willy , CEO, Proofpoint
CE Credits: 0.25
Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people.
11:30AM - 11:55AM
Customer Panel - Reducing Risk in Information Loss and Cloud Threats
Guy Delp, Vice President – Global Information Security, Pfizer Inc.
Robert McIntyre – Director of Information Security, Information Security, Tetra Pak
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group, Proofpoint
CE Credits: 0.25
With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk.
11:55AM - 12:00PM
Break and Updates
12:00PM - 12:30PM
Cybersecurity Outlook in Washington, DC with U.S. Congressman John Katko
John Katko, U.S. Congressman (R-NY)
Patrick Gaul, Executive Director, National Technology Security Coalition
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cybersecurity policy is a hot topic these days as Congress and the administration consider a host of legislative and regulatory proposals. Join us as we hear an insider’s perspective from U.S. Congressman John Katko, Ranking Member of the House Committee on Homeland Security, about the bills and regulations that will impact our industry and around the world.
12:30PM - 12:35PM
Break and Updates
12:35PM - 12:55PM
Fireside Chat with Earvin "Magic" Johnson
Earvin “Magic” Johnson, Chairman & CEO, Magic Johnson Enterprises
Ashan Willy , CEO, Proofpoint
Our Protect guest speaker will be announced shortly
12:55PM - 1:00PM
Closing Session
Day 2
Session
10:00AM - 1:15PM
Content Tracks
10:00AM - 10:05AM
Welcome to Protect - Day 2
10:05AM - 10:50AM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
10:50AM - 10:55AM
Break
10:55AM - 11:25AM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
11:25AM - 11:30AM
Break
11:30AM - 12:00PM
Extending Threat and Data Loss Controls to the New Cloud Edge
Albert Attias, Dir. of Enterprise Security, Workday
Simon Horn, CISO, Ray White
Brian Reed, Director of Cybersecurity Strategy, Proofpoint
CE Credits: 0.50
Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them.
12:00PM - 12:05PM
Break
12:05PM - 12:35PM
Reducing Data Loss & Insider Risk with Everyone Working Remote and Adopting Cloud Apps
Russ Gordon - CISO, BorgWarner
Stacy Knoup - Director of Engineering, Principal Financial Group
Jeremy Wittkop - Senior Director, Technology Services, PCMS
CE Credits: 0.50
Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data.
12:35PM - 12:40PM
Break
12:40PM - 1:10PM
Practitioner's session: Implementing key use cases with the Proofpoint Platform to Reduce Data Loss
Erich Anderson, Senior Professional Services Consultant, Proofpoint
Mike Olden, Principal Professional Services Consultant, Proofpoint
CE Credits: 0.50
Join our PS Principal Consultants to discuss how to implement several common use cases for the Proofpoint Information Protection Platform. These use cases will cover used by Proofpoint's CASB, Email DLP, and ITM offerings.
1:10PM - 1:15PM
Closing Session
10:00AM - 10:05AM
Welcome to Protect - Day 2
10:05AM - 10:50AM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
10:50AM - 10:55AM
Break
10:55AM - 11:25AM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
11:25AM - 11:30AM
Break
11:30AM - 12:00PM
Countering the Attacker's Platform with the Proofpoint Platform
James Case, CISO, Baptist Health
Giles Ring, Director of Cybersecurity, Virginia Credit Union
Mike Bailey, Manager, Product Marketing Proofpoint
CE Credits: 0.50
Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats.
12:00PM - 12:05PM
Break
12:05PM - 12:35PM
Expanding Defenses with Email Authentication
Gary Masters, System Director - Cybersecurity Engineering, Common Spirit Health
Craig Temple, Senior Product Marketing Manager, Proofpoint
CE Credits: 0.50
Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners.
12:35PM - 12:40PM
Break
12:40PM - 1:10PM
Practitioner's session: Updates in Best Practices for Threat Protection and New Product Features
Michael Beninda, Principal Professional Services Consultant
Matt Lyle, Professional Services Architect
CE Credits: 0.50
Join our Professional Services architect and principal consultant to discuss recent updates in general Best Practices as well as recommendations around new product features.
1:10PM - 1:15PM
Closing Session
10:00AM - 10:05AM
Welcome to Protect - Day 2
10:05AM - 10:50AM
Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap
Ashan Willy,CEO, Proofpoint
Darren Lee, EVP/GM, Compliance and Digital Risk Business Unit, Proofpoint
Jeremiah Ness, Engineering Director, Proofpoint
Rick Dales, VP Product Management, Compliance, Proofpoint
When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection
10:50AM - 10:55AM
Break
10:55AM - 11:25AM
Compliance & Legal Trends in 2022
Deb Tater, VP, Legal & Compliance IT, Metlife
George Tziahanas, MD, Managing Director, Information Governance, Breakwater Solutions
John Pepe, Resident CCO & Regulatory Counsel, Proofpoint
CE Credits: 0.50
In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond.
11:25AM - 11:30AM
Break
11:30AM - 12:00PM
Regulatory Guidance on Compliance
Debbie Reynolds- "The Data Diva", CEO & Chief Data Privacy Officer, Debbie Reynolds Consulting LLC
Michael Rutty, Senior Product Marketing Manager, Proofpoint
CE Credits: 0.50
Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats.
12:00PM - 12:05PM
Break
12:05PM - 12:35PM
Technologies Impacting Litigation Readiness
Phil Favro, eDiscovery and InfoGov Consultant, Innovative Driven
Shawn Aquino, Manager, Product Marketing, Proofpoint
CE Credits: 0.50
Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations.
12:35PM - 12:40PM
Break
12:40PM - 1:10PM
Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products
Raymond McGrath, Manager, Professional Services, Proofpoint
Alexander Boyd, Principal Consultant, Proofpoint
CE Credits: 0.50
Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform.
1:10PM - 1:15PM
Closing Session
10:00AM - 10:05AM
Welcome to Protect - Day 2
10:05AM - 10:50AM
Voice of the CISO report
Malcom Norman, Chief Information Security Officer, Wood
Patrick Joyce, Vice President of Information Technology and Chief Information Security Officer, Medtronic
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams.
10:50AM - 10:55AM
Break
10:55AM - 11:25AM
What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE)
Arthur Zavalkovsky, Director of Product Management, Proofpoint
Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure.
11:25AM - 11:30AM
Break
11:30AM - 12:00PM
Strategies for Board Engagement
Deborah Wheeler, Chief Information Security Officer, Delta Airlines
Dr. Chenxi, Founder & General Partner, Rain Capital Investment
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk.
12:00PM - 12:05PM
Break
12:05PM - 12:35PM
Regulatory landscape in 2022
Stewart Room, Global Head of Data Protection, Privacy and Cyber Security Legal, Strategy and Consulting Services, DWF Law LLP
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators.
12:35PM - 12:40PM
Break
12:40PM - 1:10PM
CISO perspective on cyber insurance
Davis Hake,Co-Founder and Vice President of Policy, Resilience
Mandy Huth, VP of Cybersecurity, Kohler
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging.
Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience?
1:10PM - 1:15PM
Closing Session
Day 1
1:00AM - 1:10AM
Protect Opening Message
1:10AM - 1:25AM
Proofpoint Welcome Keynote with Ashan Willy, CEO
Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks.
1:25AM - 1:55AM
The Proofpoint Platforms vs. The Attacker's Platform
Ryan Kalember, EVP, Cybersecurity Strategy, Proofpoint
Sherrod DeGrippo, VP, Threat Research & Protection, Proofpoint
CE Credits: 0.50
With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms.
1:55AM - 2:05AM
Break and Updates
2:05AM - 2:30AM
Customer Panel - Protecting Against the Threat and Risk Actor's Platform
Deneen DeFiore, Vice President & Chief Information Security Officer, United Airlines
Kris Burkhardt, Chief Information Security Officer, Accenture
Ashan Willy , CEO, Proofpoint
CE Credits: 0.25
Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people.
2:30AM - 2:55AM
Customer Panel - Reducing Risk in Information Loss and Cloud Threats
Guy Delp, Vice President – Global Information Security, Pfizer Inc.
Robert McIntyre – Director of Information Security, Information Security, Tetra Pak
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group, Proofpoint
CE Credits: 0.25
With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk.
2:55AM - 3:00AM
Break and Updates
3:00AM - 3:30AM
Cybersecurity Outlook in Washington, DC with U.S. Congressman John Katko
John Katko, U.S. Congressman (R-NY)
Patrick Gaul, Executive Director, National Technology Security Coalition
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cybersecurity policy is a hot topic these days as Congress and the administration consider a host of legislative and regulatory proposals. Join us as we hear an insider’s perspective from U.S. Congressman John Katko, Ranking Member of the House Committee on Homeland Security, about the bills and regulations that will impact our industry and around the world.
3:30AM - 3:35AM
Break and Updates
3:35AM - 3:55AM
Fireside Chat with Earvin "Magic" Johnson
Earvin “Magic” Johnson, Chairman & CEO, Magic Johnson Enterprises
Ashan Willy , CEO, Proofpoint
Our Protect guest speaker will be announced shortly
3:55AM - 4:00AM
Closing Session
Day 2
1:00AM - 4:15AM
Content Tracks
1:00AM - 1:05AM
Welcome to Protect - Day 2
1:05AM - 1:50AM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
1:50AM - 1:55AM
Break
1:55AM - 2:25AM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
2:25AM - 2:30AM
Break
2:30AM - 3:00AM
Extending Threat and Data Loss Controls to the New Cloud Edge
Albert Attias, Dir. of Enterprise Security, Workday
Simon Horn, CISO, Ray White
Brian Reed, Director of Cybersecurity Strategy, Proofpoint
CE Credits: 0.50
Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them.
3:00AM - 3:05AM
Break
3:05AM - 3:35AM
Reducing Data Loss & Insider Risk with Everyone Working Remote and Adopting Cloud Apps
Russ Gordon - CISO, BorgWarner
Stacy Knoup - Director of Engineering, Principal Financial Group
Jeremy Wittkop - Senior Director, Technology Services, PCMS
CE Credits: 0.50
Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data.
3:35AM - 3:40AM
Break
3:40AM - 4:10AM
Practitioner's session: Implementing key use cases with the Proofpoint Platform to Reduce Data Loss
Erich Anderson, Senior Professional Services Consultant, Proofpoint
Mike Olden, Principal Professional Services Consultant, Proofpoint
CE Credits: 0.50
Join our PS Principal Consultants to discuss how to implement several common use cases for the Proofpoint Information Protection Platform. These use cases will cover used by Proofpoint's CASB, Email DLP, and ITM offerings.
4:10AM - 4:15AM
Closing Session
1:00AM - 1:05AM
Welcome to Protect - Day 2
1:05AM - 1:50AM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
1:50AM - 1:55AM
Break
1:55AM - 2:25AM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
2:25AM - 2:30AM
Break
2:30AM - 3:00AM
Countering the Attacker's Platform with the Proofpoint Platform
Ayad (Ed) Sleiman - Head of Information Security - King Abdullah University of Science and Technology
Matt Cooke - Cybersecurity Strategist, Proofpoint
CE Credits: 0.50
Join us in this session where Ed Sleiman of King Abdullah University of Science and Technology (KAUST) will share his journey adopting the Proofpoint Threat Protection platform - protecting against email threats, making their people resilient, and fighting against cloud delivered threats.
3:00AM - 3:05AM
Break
3:05AM - 3:35AM
Expanding Defenses with Email Authentication
Doug Webster – Product Owner Unified Communications, KPMG International
Matt Cooke - Cybersecurity Strategist, Proofpoint
CE Credits: 0.50
Join us in this session where Doug Webster will share KPMG’s journey to DMARC reject and beyond, incorporating the new Proofpoint Secure Email Relay for application generated messages.
3:35AM - 3:40AM
Break
3:40AM - 4:10AM
Practitioner's session: Updates in Best Practices for Threat Protection and New Product Features
Michael Beninda, Principal Professional Services Consultant
Matt Lyle, Professional Services Architect
CE Credits: 0.50
Join our Professional Services architect and principal consultant to discuss recent updates in general Best Practices as well as recommendations around new product features.
4:10AM - 4:15AM
Closing Session
1:00AM - 1:05AM
Welcome to Protect - Day 2
1:05AM - 1:50AM
Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap
Ashan Willy,CEO, Proofpoint
Darren Lee, EVP/GM, Compliance and Digital Risk Business Unit, Proofpoint
Jeremiah Ness, Engineering Director, Proofpoint
Rick Dales, VP Product Management, Compliance, Proofpoint
When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection
1:50AM - 1:55AM
Break
1:55AM - 2:25AM
Compliance & Legal Trends in 2022
Deb Tater, VP, Legal & Compliance IT, Metlife
George Tziahanas, MD, Managing Director, Information Governance, Breakwater Solutions
John Pepe, Resident CCO & Regulatory Counsel, Proofpoint
CE Credits: 0.50
In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond.
2:25AM - 2:30AM
Break
2:30AM - 3:00AM
Regulatory Guidance on Compliance
Susannah Hammond, Senior Regulatory Intelligence Expert, Thomson Reuters
Dr. Michael McGrath, Snr. Director EMEA Compliance & Archiving, Proofpoint
CE Credits: 0.50
Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats.
3:00AM - 3:05AM
Break
3:05AM - 3:35AM
Technologies Impacting Litigation Readiness
Phil Favro, eDiscovery and InfoGov Consultant, Innovative Driven
Shawn Aquino, Manager, Product Marketing, Proofpoint
CE Credits: 0.50
Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations.
3:35AM - 3:40AM
Break
3:40AM - 4:10AM
Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products
Raymond McGrath, Manager, Professional Services, Proofpoint
Alexander Boyd, Principal Consultant, Proofpoint
CE Credits: 0.50
Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform.
4:10AM - 4:15AM
Closing Session
1:00AM - 1:05AM
Welcome to Protect - Day 2
1:05AM - 1:50AM
Voice of the CISO report
Malcom Norman, Chief Information Security Officer, Wood
Patrick Joyce, Vice President of Information Technology and Chief Information Security Officer, Medtronic
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams.
1:50AM - 1:55AM
Break
1:55AM - 2:25AM
What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE)
Arthur Zavalkovsky, Director of Product Management, Proofpoint
Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure.
2:25AM - 2:30AM
Break
2:30AM - 3:00AM
Strategies for Board Engagement
Deborah Wheeler, Chief Information Security Officer, Delta Airlines
Dr. Chenxi, Founder & General Partner, Rain Capital Investment
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk.
3:00AM - 3:05AM
Break
3:05AM - 3:35AM
Regulatory landscape in 2022
Stewart Room, Global Head of Data Protection, Privacy and Cyber Security Legal, Strategy and Consulting Services, DWF Law LLP
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators.
3:35AM - 3:40AM
Break
3:40AM - 4:10AM
CISO perspective on cyber insurance
Davis Hake,Co-Founder and Vice President of Policy, Resilience
Mandy Huth, VP of Cybersecurity, Kohler
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging.
Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience?
4:10AM - 4:15AM
Closing Session
Day 1
Session
1:00AM - 1:10AM
Protect Opening Message
1:10AM - 1:25AM
Proofpoint Welcome Keynote with Ashan Willy, CEO
Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks.
1:25AM - 1:55AM
The Proofpoint Platforms vs. The Attacker's Platform
Ryan Kalember, EVP, Cybersecurity Strategy, Proofpoint
Sherrod DeGrippo, VP, Threat Research & Protection, Proofpoint
CE Credits: 0.50
With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms.
1:55AM - 2:05AM
Break and Updates
2:05AM - 2:30AM
Customer Panel - Protecting Against the Threat and Risk Actor's Platform
Deneen DeFiore, Vice President & Chief Information Security Officer, United Airlines
Kris Burkhardt, Chief Information Security Officer, Accenture
Ashan Willy , CEO, Proofpoint
CE Credits: 0.25
Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people.
2:30AM - 2:55AM
Customer Panel - Reducing Risk in Information Loss and Cloud Threats
Guy Delp, Vice President – Global Information Security, Pfizer Inc.
Robert McIntyre – Director of Information Security, Information Security, Tetra Pak
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group, Proofpoint
CE Credits: 0.25
With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk.
2:55AM - 3:00AM
Break and Updates
3:00AM - 3:30AM
Cybersecurity Outlook in Washington, DC with U.S. Congressman John Katko
John Katko, U.S. Congressman (R-NY)
Patrick Gaul, Executive Director, National Technology Security Coalition
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cybersecurity policy is a hot topic these days as Congress and the administration consider a host of legislative and regulatory proposals. Join us as we hear an insider’s perspective from U.S. Congressman John Katko, Ranking Member of the House Committee on Homeland Security, about the bills and regulations that will impact our industry and around the world.
3:30AM - 3:35AM
Break and Updates
3:35AM - 3:55AM
Fireside Chat with Earvin "Magic" Johnson
Earvin “Magic” Johnson, Chairman & CEO, Magic Johnson Enterprises
Ashan Willy , CEO, Proofpoint
Our Protect guest speaker will be announced shortly
3:55AM - 4:00AM
Closing Session
Day 2
Session
1:00AM - 4:15AM
Content Tracks
1:00AM - 1:05AM
Welcome to Protect - Day 2
1:05AM - 1:50AM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
1:50AM - 1:55AM
Break
1:55AM - 2:25AM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
2:25AM - 2:30AM
Break
2:30AM - 3:00AM
Extending Threat and Data Loss Controls to the New Cloud Edge
Albert Attias, Dir. of Enterprise Security, Workday
Simon Horn, CISO, Ray White
Brian Reed, Director of Cybersecurity Strategy, Proofpoint
CE Credits: 0.50
Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them.
3:00AM - 3:05AM
Break
3:05AM - 3:35AM
Reducing Data Loss & Insider Risk with Everyone Working Remote and Adopting Cloud Apps
Russ Gordon - CISO, BorgWarner
Stacy Knoup - Director of Engineering, Principal Financial Group
Jeremy Wittkop - Senior Director, Technology Services, PCMS
CE Credits: 0.50
Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data.
3:35AM - 3:40AM
Break
3:40AM - 4:10AM
Practitioner's session: Implementing key use cases with the Proofpoint Platform to Reduce Data Loss
Erich Anderson, Senior Professional Services Consultant, Proofpoint
Mike Olden, Principal Professional Services Consultant, Proofpoint
CE Credits: 0.50
Join our PS Principal Consultants to discuss how to implement several common use cases for the Proofpoint Information Protection Platform. These use cases will cover used by Proofpoint's CASB, Email DLP, and ITM offerings.
4:10AM - 4:15AM
Closing Session
1:00AM - 1:05AM
Welcome to Protect - Day 2
1:05AM - 1:50AM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
1:50AM - 1:55AM
Break
1:55AM - 2:25AM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
2:25AM - 2:30AM
Break
2:30AM - 3:00AM
Countering the Attacker's Platform with the Proofpoint Platform
Ayad (Ed) Sleiman - Head of Information Security - King Abdullah University of Science and Technology
Matt Cooke - Cybersecurity Strategist, Proofpoint
CE Credits: 0.50
Join us in this session where Ed Sleiman of King Abdullah University of Science and Technology (KAUST) will share his journey adopting the Proofpoint Threat Protection platform - protecting against email threats, making their people resilient, and fighting against cloud delivered threats.
3:00AM - 3:05AM
Break
3:05AM - 3:35AM
Expanding Defenses with Email Authentication
Doug Webster – Product Owner Unified Communications, KPMG International
Matt Cooke - Cybersecurity Strategist, Proofpoint
CE Credits: 0.50
Join us in this session where Doug Webster will share KPMG’s journey to DMARC reject and beyond, incorporating the new Proofpoint Secure Email Relay for application generated messages.
3:35AM - 3:40AM
Break
3:40AM - 4:10AM
Practitioner's session: Updates in Best Practices for Threat Protection and New Product Features
Michael Beninda, Principal Professional Services Consultant
Matt Lyle, Professional Services Architect
CE Credits: 0.50
Join our Professional Services architect and principal consultant to discuss recent updates in general Best Practices as well as recommendations around new product features.
4:10AM - 4:15AM
Closing Session
1:00AM - 1:05AM
Welcome to Protect - Day 2
1:05AM - 1:50AM
Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap
Ashan Willy,CEO, Proofpoint
Darren Lee, EVP/GM, Compliance and Digital Risk Business Unit, Proofpoint
Jeremiah Ness, Engineering Director, Proofpoint
Rick Dales, VP Product Management, Compliance, Proofpoint
When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection
1:50AM - 1:55AM
Break
1:55AM - 2:25AM
Compliance & Legal Trends in 2022
Deb Tater, VP, Legal & Compliance IT, Metlife
George Tziahanas, MD, Managing Director, Information Governance, Breakwater Solutions
John Pepe, Resident CCO & Regulatory Counsel, Proofpoint
CE Credits: 0.50
In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond.
2:25AM - 2:30AM
Break
2:30AM - 3:00AM
Regulatory Guidance on Compliance
Susannah Hammond, Senior Regulatory Intelligence Expert, Thomson Reuters
Dr. Michael McGrath, Snr. Director EMEA Compliance & Archiving, Proofpoint
CE Credits: 0.50
Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats.
3:00AM - 3:05AM
Break
3:05AM - 3:35AM
Technologies Impacting Litigation Readiness
Phil Favro, eDiscovery and InfoGov Consultant, Innovative Driven
Shawn Aquino, Manager, Product Marketing, Proofpoint
CE Credits: 0.50
Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations.
3:35AM - 3:40AM
Break
3:40AM - 4:10AM
Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products
Raymond McGrath, Manager, Professional Services, Proofpoint
Alexander Boyd, Principal Consultant, Proofpoint
CE Credits: 0.50
Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform.
4:10AM - 4:15AM
Closing Session
1:00AM - 1:05AM
Welcome to Protect - Day 2
1:05AM - 1:50AM
Voice of the CISO report
Malcom Norman, Chief Information Security Officer, Wood
Patrick Joyce, Vice President of Information Technology and Chief Information Security Officer, Medtronic
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams.
1:50AM - 1:55AM
Break
1:55AM - 2:25AM
What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE)
Arthur Zavalkovsky, Director of Product Management, Proofpoint
Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure.
2:25AM - 2:30AM
Break
2:30AM - 3:00AM
Strategies for Board Engagement
Deborah Wheeler, Chief Information Security Officer, Delta Airlines
Dr. Chenxi, Founder & General Partner, Rain Capital Investment
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk.
3:00AM - 3:05AM
Break
3:05AM - 3:35AM
Regulatory landscape in 2022
Stewart Room, Global Head of Data Protection, Privacy and Cyber Security Legal, Strategy and Consulting Services, DWF Law LLP
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Managing data privacy risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with Global regulators.
3:35AM - 3:40AM
Break
3:40AM - 4:10AM
CISO perspective on cyber insurance
Davis Hake,Co-Founder and Vice President of Policy, Resilience
Mandy Huth, VP of Cybersecurity, Kohler
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging.
Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience?
4:10AM - 4:15AM
Closing Session
Day 1
7:00PM - 7:10PM
Protect Opening Message
7:10PM - 7:25PM
Proofpoint Welcome Keynote with Ashan Willy, CEO
Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks.
7:25PM - 7:55PM
The Proofpoint Platforms vs. The Attacker's Platform
Ryan Kalember, EVP, Cybersecurity Strategy, Proofpoint
Sherrod DeGrippo, VP, Threat Research & Protection, Proofpoint
CE Credits: 0.50
With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms.
7:55PM - 8:05PM
Break and Updates
8:05PM - 8:30PM
Customer Panel - Protecting Against the Threat and Risk Actor's Platform
Deneen DeFiore, Vice President & Chief Information Security Officer, United Airlines
Kris Burkhardt, Chief Information Security Officer, Accenture
Ashan Willy , CEO, Proofpoint
CE Credits: 0.25
Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people.
8:30PM - 8:55PM
Customer Panel - Reducing Risk in Information Loss and Cloud Threats
Guy Delp, Vice President – Global Information Security, Pfizer Inc.
Robert McIntyre – Director of Information Security, Information Security, Tetra Pak
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group, Proofpoint
CE Credits: 0.25
With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk.
8:55PM - 9:00PM
Break and Updates
9:00PM - 9:30PM
Cybersecurity Outlook in Washington, DC with U.S. Congressman John Katko
John Katko, U.S. Congressman (R-NY)
Patrick Gaul, Executive Director, National Technology Security Coalition
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cybersecurity policy is a hot topic these days as Congress and the administration consider a host of legislative and regulatory proposals. Join us as we hear an insider’s perspective from U.S. Congressman John Katko, Ranking Member of the House Committee on Homeland Security, about the bills and regulations that will impact our industry and around the world.
9:30PM - 9:35PM
Break and Updates
9:35PM - 9:55PM
Fireside Chat with Earvin "Magic" Johnson
Earvin “Magic” Johnson, Chairman & CEO, Magic Johnson Enterprises
Ashan Willy , CEO, Proofpoint
Our Protect guest speaker will be announced shortly
9:55PM - 10:00PM
Closing Session
Day 2
7:00PM - 10:15PM
Content Tracks
7:00PM - 7:05PM
Welcome to Protect - Day 2
7:05PM - 7:50PM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
7:50PM - 7:55PM
Break
7:55PM - 8:25PM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
8:25PM - 8:30PM
Break
8:30PM - 9:00PM
Extending Threat and Data Loss Controls to the New Cloud Edge
Albert Attias, Dir. of Enterprise Security, Workday
Simon Horn, CISO, Ray White
Brian Reed, Director of Cybersecurity Strategy, Proofpoint
CE Credits: 0.50
Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them.
9:00PM - 9:05PM
Break
9:05PM - 9:35PM
Reducing Data Loss & Insider Risk with Everyone Working Remote and Adopting Cloud Apps
Russ Gordon - CISO, BorgWarner
Stacy Knoup - Director of Engineering, Principal Financial Group
Jeremy Wittkop - Senior Director, Technology Services, PCMS
CE Credits: 0.50
Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data.
9:35PM - 9:40PM
Break
9:40PM - 10:10PM
Practitioner's session: Implementing key use cases with the Proofpoint Platform to Reduce Data Loss
Erich Anderson, Senior Professional Services Consultant, Proofpoint
Mike Olden, Principal Professional Services Consultant, Proofpoint
CE Credits: 0.50
Join our PS Principal Consultants to discuss how to implement several common use cases for the Proofpoint Information Protection Platform. These use cases will cover used by Proofpoint's CASB, Email DLP, and ITM offerings.
10:10PM - 10:15PM
Closing Session
7:00PM - 7:05PM
Welcome to Protect - Day 2
7:05PM - 7:50PM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
7:50PM - 7:55PM
Break
7:55PM - 8:25PM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
8:25PM - 8:30PM
Break
8:30PM - 9:00PM
Countering the Attacker's Platform with the Proofpoint Platform
Venkat Balakrishnan, CISO, TAL Insurance
Matt Lange, General Manager Enterprise Security, APA Group
Jennifer Cheng, Director, Product Marketing, Proofpoint
CE Credits: 0.50
Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats.
9:00PM - 9:05PM
Break
9:05PM - 9:35PM
Expanding Defenses with Email Authentication
Mark Burns , Security and GRC Lead, Custom Fleet
Mark Bretherton, IT Network and Security Lead, Maribyrnong City Council
Adrian Covich, Sr. Director, Technical Sales, Proofpoint
CE Credits: 0.50
Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners.
9:35PM - 9:40PM
Break
9:40PM - 10:10PM
Practitioner's session: Updates in Best Practices for Threat Protection and New Product Features
Michael Beninda, Principal Professional Services Consultant
Matt Lyle, Professional Services Architect
CE Credits: 0.50
Join our Professional Services architect and principal consultant to discuss recent updates in general Best Practices as well as recommendations around new product features.
10:10PM - 10:15PM
Closing Session
7:00PM - 7:05PM
Welcome to Protect - Day 2
7:05PM - 7:50PM
Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap
Ashan Willy,CEO, Proofpoint
Darren Lee, EVP/GM, Compliance and Digital Risk Business Unit, Proofpoint
Jeremiah Ness, Engineering Director, Proofpoint
Rick Dales, VP Product Management, Compliance, Proofpoint
When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection
7:50PM - 7:55PM
Break
7:55PM - 8:25PM
Compliance & Legal Trends in 2022
Deb Tater, VP, Legal & Compliance IT, Metlife
George Tziahanas, MD, Managing Director, Information Governance, Breakwater Solutions
John Pepe, Resident CCO & Regulatory Counsel, Proofpoint
CE Credits: 0.50
In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond.
8:25PM - 8:30PM
Break
8:30PM - 9:00PM
Regulatory Guidance on Compliance
Susannah Hammond, Senior Regulatory Intelligence Expert, Thomson Reuters
Dr. Michael McGrath, Snr. Director EMEA Compliance & Archiving , Proofpoint
CE Credits: 0.50
Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats.
9:00PM - 9:05PM
Break
9:05PM - 9:35PM
Technologies Impacting Litigation Readiness
Phil Favro, eDiscovery and InfoGov Consultant, Innovative Driven
Shawn Aquino, Manager, Product Marketing, Proofpoint
CE Credits: 0.50
Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations.
9:35PM - 9:40PM
Break
9:40PM - 10:10PM
Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products
Raymond McGrath, Manager, Professional Services, Proofpoint
Alexander Boyd, Principal Consultant, Proofpoint
CE Credits: 0.50
Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform.
10:10PM - 10:15PM
Closing Session
7:00PM - 7:05PM
Welcome to Protect - Day 2
7:05PM - 7:50PM
Voice of the CISO report
Malcom Norman, Chief Information Security Officer, Wood
Patrick Joyce, Vice President of Information Technology and Chief Information Security Officer, Medtronic
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams.
7:50PM - 7:55PM
Break
7:55PM - 8:25PM
What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE)
Arthur Zavalkovsky, Director of Product Management, Proofpoint
Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure.
8:25PM - 8:30PM
Break
8:30PM - 9:00PM
Strategies for Board Engagement
Deborah Wheeler, Chief Information Security Officer, Delta Airlines
Dr. Chenxi, Founder & General Partner, Rain Capital Investment
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk.
9:00PM - 9:05PM
Break
9:05PM - 9:35PM
Regulatory landscape in 2022
Cathie Armour, Commissioner, Australian Securities, and Investment Commissions
Yvette Lejins, Resident CISO, Proofpoint
CE Credits: 0.50
Managing cyber risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with global regulators.
9:35PM - 9:40PM
Break
9:40PM - 10:10PM
CISO perspective on cyber insurance
Davis Hake,Co-Founder and Vice President of Policy, Resilience
Mandy Huth, VP of Cybersecurity, Kohler
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging.
Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience?
10:10PM - 10:15PM
Closing Session
Day 1
Session
7:00PM - 7:10PM
Protect Opening Message
7:10PM - 7:25PM
Proofpoint Welcome Keynote with Ashan Willy, CEO
Ashan will provide a company update and share exciting announcements on our people-centric innovations to help you mitigate security and compliance risks.
7:25PM - 7:55PM
The Proofpoint Platforms vs. The Attacker's Platform
Ryan Kalember, EVP, Cybersecurity Strategy, Proofpoint
Sherrod DeGrippo, VP, Threat Research & Protection, Proofpoint
CE Credits: 0.50
With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms.
7:55PM - 8:05PM
Break and Updates
8:05PM - 8:30PM
Customer Panel - Protecting Against the Threat and Risk Actor's Platform
Deneen DeFiore, Vice President & Chief Information Security Officer, United Airlines
Kris Burkhardt, Chief Information Security Officer, Accenture
Ashan Willy , CEO, Proofpoint
CE Credits: 0.25
Phishing, ransomware, BEC, account compromised suppliers… the list of tools accessible to threat actors continues to both expand and integrate into the modern attacker's platform. Join us in this panel of CISOs to discuss how they counter the threat actor’s attack platform targeting their most valuable asset - their people.
8:30PM - 8:55PM
Customer Panel - Reducing Risk in Information Loss and Cloud Threats
Guy Delp, Vice President – Global Information Security, Pfizer Inc.
Robert McIntyre – Director of Information Security, Information Security, Tetra Pak
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group, Proofpoint
CE Credits: 0.25
With all that's changed in technology, data still doesn't lose itself - malicious, compromised, or careless users lose it. A new people-centric approach is needed to counter data loss - especially with employees working remote and adopting cloud applications. Join this panel of CISOs as they discuss how they counter data loss and reduce insider risk.
8:55PM - 9:00PM
Break and Updates
9:00PM - 9:30PM
Cybersecurity Outlook in Washington, DC with U.S. Congressman John Katko
John Katko, U.S. Congressman (R-NY)
Patrick Gaul, Executive Director, National Technology Security Coalition
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cybersecurity policy is a hot topic these days as Congress and the administration consider a host of legislative and regulatory proposals. Join us as we hear an insider’s perspective from U.S. Congressman John Katko, Ranking Member of the House Committee on Homeland Security, about the bills and regulations that will impact our industry and around the world.
9:30PM - 9:35PM
Break and Updates
9:35PM - 9:55PM
Fireside Chat with Earvin "Magic" Johnson
Earvin “Magic” Johnson, Chairman & CEO, Magic Johnson Enterprises
Ashan Willy , CEO, Proofpoint
Our Protect guest speaker will be announced shortly
9:55PM - 10:00PM
Closing Session
Day 2
Session
7:00PM - 10:15PM
Content Tracks
7:00PM - 7:05PM
Welcome to Protect - Day 2
7:05PM - 7:50PM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
7:50PM - 7:55PM
Break
7:55PM - 8:25PM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
8:25PM - 8:30PM
Break
8:30PM - 9:00PM
Extending Threat and Data Loss Controls to the New Cloud Edge
Albert Attias, Dir. of Enterprise Security, Workday
Simon Horn, CISO, Ray White
Brian Reed, Director of Cybersecurity Strategy, Proofpoint
CE Credits: 0.50
Proofpoint has integrated technologies such as CASB, SWG, RBI to address the needs of cloud security into what we call Proofpoint Security Services Edge. But let's put aside the technology acronym and join this panel of cloud security experts to discuss the key use cases in Proofpoint SSE and why Proofpoint is uniquely able to solve them.
9:00PM - 9:05PM
Break
9:05PM - 9:35PM
Reducing Data Loss & Insider Risk with Everyone Working Remote and Adopting Cloud Apps
Russ Gordon - CISO, BorgWarner
Stacy Knoup - Director of Engineering, Principal Financial Group
Jeremy Wittkop - Senior Director, Technology Services, PCMS
CE Credits: 0.50
Join us in this panel where users of the Proofpoint platform will share how they adopted a people-centric approach to data loss and insider threat and were able to reduce the risk associated with their data.
9:35PM - 9:40PM
Break
9:40PM - 10:10PM
Practitioner's session: Implementing key use cases with the Proofpoint Platform to Reduce Data Loss
Erich Anderson, Senior Professional Services Consultant, Proofpoint
Mike Olden, Principal Professional Services Consultant, Proofpoint
CE Credits: 0.50
Join our PS Principal Consultants to discuss how to implement several common use cases for the Proofpoint Information Protection Platform. These use cases will cover used by Proofpoint's CASB, Email DLP, and ITM offerings.
10:10PM - 10:15PM
Closing Session
7:00PM - 7:05PM
Welcome to Protect - Day 2
7:05PM - 7:50PM
Roadmap + Vision: Defending Against Threats Targeting Your People
Jeff Burstein, Vice President, Product Management, Proofpoint
Robert Holmes, Group Vice President and General Manager, Identity Defense, Proofpoint
7:50PM - 7:55PM
Break
7:55PM - 8:25PM
Roadmap + Vision: Reducing Risk of Cloud Threats and Data Loss
Aruna Sreeam, Sr. Director of Product Management, Information Protection
Elad Horn, Vice President of Product, Cloud Security
Mayank Choudhary, EVP and GM, Information and Cloud Security Products Group
8:25PM - 8:30PM
Break
8:30PM - 9:00PM
Countering the Attacker's Platform with the Proofpoint Platform
Venkat Balakrishnan, CISO, TAL Insurance
Matt Lange, General Manager Enterprise Security, APA Group
Jennifer Cheng, Director, Product Marketing, Proofpoint
CE Credits: 0.50
Join us in this panel where Proofpoint users will share their journey adopting and growing their Proofpoint Threat Protection platform - from protecting against email threats, making their end users resilient, fighting against cloud delivered threats.
9:00PM - 9:05PM
Break
9:05PM - 9:35PM
Expanding Defenses with Email Authentication
Mark Burns , Security and GRC Lead, Custom Fleet
Mark Bretherton, IT Network and Security Lead, Maribyrnong City Council
Adrian Covich, Sr. Director, Technical Sales, Proofpoint
CE Credits: 0.50
Join this customer session to learn why and how they implemented email authentication to address the concerns of email impersonation, BEC attacks, supplier risk and application email hygiene aimed at employees, customers and partners.
9:35PM - 9:40PM
Break
9:40PM - 10:10PM
Practitioner's session: Updates in Best Practices for Threat Protection and New Product Features
Michael Beninda, Principal Professional Services Consultant
Matt Lyle, Professional Services Architect
CE Credits: 0.50
Join our Professional Services architect and principal consultant to discuss recent updates in general Best Practices as well as recommendations around new product features.
10:10PM - 10:15PM
Closing Session
7:00PM - 7:05PM
Welcome to Protect - Day 2
7:05PM - 7:50PM
Reducing Compliance and Legal Risks Effectively: Intelligent Compliance Roadmap
Ashan Willy,CEO, Proofpoint
Darren Lee, EVP/GM, Compliance and Digital Risk Business Unit, Proofpoint
Jeremiah Ness, Engineering Director, Proofpoint
Rick Dales, VP Product Management, Compliance, Proofpoint
When the next decade of workplace communications relies solely on digital collaboration technologies like MSFT Teams, Zoom, and Slack, it's critical for Financial Services and regulated organizations to understand how Proofpoint is staying ahead with you for maximum Compliance and Legal protection
7:50PM - 7:55PM
Break
7:55PM - 8:25PM
Compliance & Legal Trends in 2022
Deb Tater, VP, Legal & Compliance IT, Metlife
George Tziahanas, MD, Managing Director, Information Governance, Breakwater Solutions
John Pepe, Resident CCO & Regulatory Counsel, Proofpoint
CE Credits: 0.50
In the current ever-changing business landscape, join us to learn from industry experts and Proofpoint specialists as they discuss views on Compliance and Legal trends in 2022 and beyond.
8:25PM - 8:30PM
Break
8:30PM - 9:00PM
Regulatory Guidance on Compliance
Susannah Hammond, Senior Regulatory Intelligence Expert, Thomson Reuters
Dr. Michael McGrath, Snr. Director EMEA Compliance & Archiving , Proofpoint
CE Credits: 0.50
Join us for a session with a regulatory industry expert to discuss best practices on how regulated organizations monitor and supervise business communications while protecting critical corporate data from insider threats.
9:00PM - 9:05PM
Break
9:05PM - 9:35PM
Technologies Impacting Litigation Readiness
Phil Favro, eDiscovery and InfoGov Consultant, Innovative Driven
Shawn Aquino, Manager, Product Marketing, Proofpoint
CE Credits: 0.50
Join us for a session with an experienced legal expert to discuss trends and best practices on building a sound corporate legal protection strategy for organizations with high exposure to litigations.
9:35PM - 9:40PM
Break
9:40PM - 10:10PM
Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products
Raymond McGrath, Manager, Professional Services, Proofpoint
Alexander Boyd, Principal Consultant, Proofpoint
CE Credits: 0.50
Join us for a technical, hands-on session on how to maximize the impact of your Proofpoint Compliance Platform.
10:10PM - 10:15PM
Closing Session
7:00PM - 7:05PM
Welcome to Protect - Day 2
7:05PM - 7:50PM
Voice of the CISO report
Malcom Norman, Chief Information Security Officer, Wood
Patrick Joyce, Vice President of Information Technology and Chief Information Security Officer, Medtronic
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams.
7:50PM - 7:55PM
Break
7:55PM - 8:25PM
What’s Next in People-Centric Security: Roadmap and Overview for Nexus People Risk Explorer (NPRE)
Arthur Zavalkovsky, Director of Product Management, Proofpoint
Understanding your people-centric risk allows one to better plan and reduce your organization's risk posture. Join us in this session as we discuss with customers how they leverage the Proofpoint Nexus People Risk Explorer to understand risk and activate processes to reduce risk exposure.
8:25PM - 8:30PM
Break
8:30PM - 9:00PM
Strategies for Board Engagement
Deborah Wheeler, Chief Information Security Officer, Delta Airlines
Dr. Chenxi, Founder & General Partner, Rain Capital Investment
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Recent events, including SolarWinds, Colonial Pipeline, and Log4J have served to elevate the profile of the CISO. The CISO now has a leadership voice and must use it to instill confidence at the highest levels of the organization and as the foremost executive on the front lines against the threat of systemic risk. A single cyber event can have devastating consequences on an organization's ability to deliver its operational value. CISOs need to have identified the potential ‘showstopper’ risks for their enterprise and ensure that the Board understands the position. Learn from veteran Board members about their journey to the Board room and expectations for understanding cyber risk.
9:00PM - 9:05PM
Break
9:05PM - 9:35PM
Regulatory landscape in 2022
Cathie Armour, Commissioner, Australian Securities, and Investment Commissions
Yvette Lejins, Resident CISO, Proofpoint
CE Credits: 0.50
Managing cyber risk in a dynamic regulatory environment is challenging. Compounding that is the fact that you have to defend your regulated data against threats inside and outside the organization. You need to put in “appropriate” or “reasonable” security measures, but it is up to you to develop them. Join us for a critical fireside chat with global regulators.
9:35PM - 9:40PM
Break
9:40PM - 10:10PM
CISO perspective on cyber insurance
Davis Hake,Co-Founder and Vice President of Policy, Resilience
Mandy Huth, VP of Cybersecurity, Kohler
Lucia Milică, JD, Global Resident CISO, Proofpoint
CE Credits: 0.50
Cyber insurance is designed to transfer risks to the insurer. For insurers to be profitable, they must have a fundamental grasp of the risks facing organizations and shifts in the threat landscape. As work becomes increasingly flexible and more solutions move to the cloud, protecting organizations is increasingly challenging.
Despite the challenges, Cyber Insurance exists for organizations to help address residual risk. Many organizations are faced with exponential premium increases as they try to understand what cyber insurance actually covers, while others are forced to renew due to contractual obligations or decide to self-insure. This environment creates confusion as organizations ask: does cyber insurance provides risk mitigation or just a measured level of resilience?
10:10PM - 10:15PM
Closing Session
Sponsors
