Frequently Asked Questions

Get all the answers here.

Learn More

See our blueprint for security and compliance to design your own framework for success

The strongest organizations have a well-designed blueprint for cybersecurity and compliance. Proofpoint has a comprehensive strategy to share with you—along with the solutions and threat intelligence to back it up. Join us at Protect 2020, online, and we’ll roll up our sleeves and lay it all out in front of you.

Reasons to attend Protect 2020:

  • Hear compelling keynotes from Proofpoint execs and industry experts
  • Discover how top cybersecurity and compliance professionals are protecting their organizations and people with Proofpoint products
  • Learn about new Proofpoint products that will accelerate your journey to people-centric security and compliance
  • Learn how to access and apply data to fortify your security and compliance posture
  • Explore topics designed to help CISO leadership elevate their game in people-centric security and compliance

Thank you for your submission.

Featured Speakers

Gary Steele,

Chief Executive Officer, Proofpoint

Ryan Kalember,

EVP, Cybersecurity Strategy, Proofpoint

David Knight,

EVP and GM, Security Products, Proofpoint

Sherrod DeGrippo,

Sr. Director, Threat Research and Detection, Proofpoint

Lucia Milică,

Resident CISO, Proofpoint

Tracks

Real strategies. Actionable insights. Plan your experience at Protect 2020.

Cloud Security

Our Cloud Security track delivers real-world insight, best practices and frameworks to design and build an effective cloud security architecture. Learn how Proofpoint technology can help ease the transition to cloud services—zero-trust secure. Participants will:

  • Hear the real-world experiences of peers making the transition to the cloud
  • Preview the future direction of Proofpoint cloud security technologies
  • Learn how email and cloud threats are blended together by attackers to target your people
  • Learn how to secure cloud applications and data, as well as scale access for remote workers
  • See how the zero-trust model can propel your organization to cloud security

Email Security

In our Email Security track, you’ll meet with Proofpoint customers, researchers and product leaders to explore the evolving threat landscape and best practices to defend against email threats. You’ll get the information you need to build your blueprint to protect against the No.1 threat vector, including:

  • An overview of the evolving threat landscape with Proofpoint threat research
  • Customer-led discussions featuring strategies and best practices for email security
  • A preview of Proofpoint email security product strategy, innovations and road map
  • Learn how insights into cloud threats will augment your security posture in email protection
  • Practitioner sessions covering practical implementation of email security controls

Information Protection

In the post-perimeter, work-from-home world, a detailed plan for information protection is essential. In this track, you’ll learn how to prevent data loss across email, cloud and endpoint. You’ll also learn about managing incident response and preventing insider-led security breaches, and more. Sessions include:

  • An overview of the Proofpoint people-centric information protection vision and strategy
  • Practitioner discussions covering practical implementation of modern information protection strategies
  • Guided tours of new innovation within the Proofpoint information protection platform
  • Panels featuring customers and experts discussing strategies and best practices

Security Awareness Training

Building a culture of security means designing superior training. This track explores how others extend technological controls with training, and details how our Very Attacked People™ (VAP) insights enable targeted training based on threats seen in the wild. You’ll also:

  • Learn how security awareness training can complement existing security technology
  • Understand how a security-focused culture can positively affect your security posture
  • See how Proofpoint threat intelligence can shape a security awareness program that is effective in affecting behavior change

CISO / Leadership

The architects of security strategies gather to share insights in this special CISO track. Alongside prominent thought leaders, you’ll take away a wealth of best practices and leadership advice on better ways to mitigate risk and justify technology spend. Topics include:

  • Collaborating with your CFO and presenting to the board
  • Introducing new tools and frameworks that define the people-centric blueprint
  • Exploring what’s next for cybersecurity in a post-pandemic economy
 

Agenda


 

Day 1

All agenda times listed in AEST

12:30PM-12:40PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

12:40PM-1:10PM

Proofpoint Welcome Keynote with Gary Steele, CEO

Gary Steele, Chief Executive Officer, Proofpoint


Learn about the latest innovations we’re delivering in people-centric security, as well as our continued commitments to delivering new insights that resonate from the SOC to the boardroom. Gary will also highlight our continued investments in our customers’ experience and the latest developments with our security ecosystem partners.

1:10PM-1:15PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

1:15PM-2:15PM

Content Tracks

1:15PM-2:30PM

Email Security Roadmap

Ashan Willy,EVP and GM, Security Products and Services, Proofpoint

Robert Holmes, VP & GM, Email Fraud Defense, Proofpoint

Luis Blando, SVP, Engineering – Security Products and Services Group, Proofpoint


Because attackers don't stop, we don't stop innovating and advancing our email security capabilities. Join this session as Proofpoint product experts unveil the blueprint for the future of Proofpoint Email Security. You'll hear about our long-term vision as well as soon to be available capabilities.

2:00PM-2:30PM

Reducing Phishing Attacks and Operational Costs through Automation

Tanner Luxner, Product Marketing Manager, Proofpoint


With email as an organisation's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

1:15PM-2:00PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director, Security Research, Proofpoint


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

2:20PM-2:30PM

Protecting Your Cloud Data with Proofpoint CASB

Itir Clarke, Senior Product Marketing Manager, Proofpoint


With migration to the cloud, the same is taking place for an organisation's data to realize cost savings and enable productivity. However, the threat against an organisation's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organisation's data in the cloud with Proofpoint CASB.

1:15PM-2:00PM

The New Blue Print: The Future of People-Centric Information Protection

David Knight, EVP and GM of Cloud Security Group, Proofpoint

Mayank Choudhary, SVP of Product, Insider Threat Management, Proofpoint


A people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy for Enterprise DLP and Insider Threat Management. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era.

2:00PM-2:30PM

Best Practices: Building an Information Protection Program

Tim Choi, VP of Product Marketing, Proofpoint

Alex Kremer, VP of Chief Architect, Proofpoint


Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.

1:15PM-2:30PM

Security Awareness Roadmap

Matt Lane, Sr. Product Manager, Proofpoint

Mark Wuslich, Sr. Product Manager, Proofpoint

Raghen Morrow, Product Manager of Business Intelligence, Proofpoint

Ali Mazzotta, Product Manager, Proofpoint

Al Himler, Sr. Director of Product Management, Proofpoint

Susan Mackowiak, Sr. Director of Program Content, Proofpoint


Learn about planned enhancements to the Proofpoint Security Awareness platform, how they can enable you to effectively execute your programme, and our future plans to extend and enhance our training content. Covered areas will include reporting, assessments, user management, customization center, and integration with the broader Proofpoint technology portfolio. Attendees will learn how to deliver the best ROI in 2020 and beyond.

1:15PM-2:00PM

Introducing Nexus Risk Dashboard

Julie Sutton, Information Security Manager, City and County of Denver

Chris White, CISO, IPG

Jenn Cheng, Director of Product Marketing, Proofpoint


Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.

2:00PM-2:30PM

Speaking Your CFO's Language

Paul Auvil, Chief Financial Officer, Proofpoint

Lucia Milica, Global Resident CISO, Proofpoint


Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.

2:30PM-3:00PM

The New Blueprint with Proofpoint Security and Compliance

David Knight, EVP and GM of Security Products Proofpoint


Whether your challenge is business email compromise, cloud security, or securing newly remote workers, Proofpoint’s people-centric roadmap is delivering the innovations to keep your people protected. Join Proofpoint’s David Knight to hear about what we’ve delivered and what we’re building across our email security, cloud security, information protection, and security awareness training product lines. From new detection techniques to stop the latest attacker innovations to incredible new risk analytics, this session will help you look at your own security blueprint with new eyes.

3:00PM-3:05PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

Day 2

All agenda times listed in AEST

12:00PM-12:10PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

12:10AM-1:10PM

Content Tracks

12:10PM-12:40PM

How to Protect Your Customers, the Public, Employees, and the Supply Chain Through DMARC

Amin Manzoori, Email Fraud Defense Specialist, Proofpoint

Adrian Covich, Senior Director of Technical Sales, Proofpoint


With staggering losses of $1.7 billion in 2019, business email compromise (BEC) is a crucial attack issue for organisations and government agencies to protect against. As these threats don't typically include malware or detectable malicious intent, protecting against them is not an easy task. The DMARC (Domain-based Message Authentication Reporting and Conformance) standard is one of the most powerful and proactive weapons to date in the fight today’s advanced email threats including BEC and consumer phishing. However, many organisations have not implemented email authentication best practices and may be unknowingly exposing themselves to cybercriminals. This session will explain how to you can help eliminate the impact of email fraud, gain granular visibility across your email ecosystem and implement authentication with confidence.

12:40PM-1:10PM

Reducing Phishing Attacks and Operational Costs through Automation

Tanner Luxner, Product Marketing Manager, Proofpoint


With email as an organisation's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

12:10PM-12:40PM

Best Practices: Office 365 with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

12:40PM-1:15PM

Leverage VAPs as a Blueprint to Apply Adaptive Controls

Gary Hayslip, CISO, Softbank Investment Advisors

Brett Shaw, Senior Product Marketing Manager, Proofpoint

Neko Papez, Product Marketing Manager, Proofpoint


In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how to deploy solutions for better protection against future attacks.

12:10PM-12:40PM

Panel discussion: The Evolution of the Insider Threat

Stacey Champagne, Insider Threat Investigations Lead, PayPal

Gary Hayslip, CISO of Softbank Investment Advisors

Rob Oden, Cybersecurity Architect, L3 Harris

Mike McKee, EVP and GM of Insider Threat Management, Proofpoint


Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organisations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutionsrelated to insider threat management.

12:40PM-1:10PM

Introducing the Next Generation of People-Centric Insider Threat Management Technology

Mayank Choudhary, SVP for Products, Insider Threat Management, Proofpoint


Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

12:10PM-12:40PM

Identifying Risk in Your Organisation

Andrew Warren-Nichols, Security Awareness Specialist, Proofpoint


Walk-through our current reporting tools to understand how you can identify risk in your organisation.

12:40PM-1:10PM

How to effectively measure and report real value for security awareness training

Alan Levine, CISO Advisor


The need for security awareness training has never been more acute; increasing threats, WFH and endless regulatory compliance. Your programs are making a difference; but how do you show it? Learn how to demonstrate value and build the case to expand your program and acquire critical resources.

12:10PM-12:40PM

Threat Intelligence Observations for 2020 and Beyond

Josh Burgess, Lead Technical Strategic Advisor, CrowdStrike


Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.


Attend this session to learn about:

• The ransomware cyber threat landscape

• Using strategic, operational and tactical assessments to shine lights on points of exposure

• How technical knowledge, intel, threat hunting and partners can help pave the way forward

• Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint

12:40PM-1:10PM

Mitigating Risk in a Distributed Workforce

Kelsey Nelson, Senior Product Marketing Manager, Okta


While it would have been nice if threat actors had taken a break during the initial COVID lockdowns, what we actually saw was a significant increase in cyber attacks -- particularly social engineering attacks, such as phishing. As this 'new normal' continues to evolve, businesses need a way to mitigate these attacks and protect their increasingly distributed workforce.


In this session, we'll talk through the role of risk-based authentication in modern, zero trust security as well as how integrations across security technologies, such as with Proofpoint, Okta + CrowdStrike, can enhance security and also productivity -- wherever your workers are, and whatever tools they're using.

1:10PM-1:20PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

1:20PM-2:20PM

Risky Business Live

Helen Patton, Chief Information Security Officer, The Ohio State University

Krishnan Chellakarai, Chief Information Security Officer, Gilead Sciences

Sheldon Cuffie, VP & Enterprise CISO, American Family Insurance

Patrick Gray, Risky.Biz

Sherrod DeGrippo, Sr. Director of Threat Research and Detection, Proofpoint

2:20PM-2:30PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

 

Day 1

All agenda times listed in AEST

Session

12:30PM-12:40PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

12:40PM-1:10PM

Proofpoint Welcome Keynote with Gary Steele, CEO

Gary Steele, Chief Executive Officer, Proofpoint


Learn about the latest innovations we’re delivering in people-centric security, as well as our continued commitments to delivering new insights that resonate from the SOC to the boardroom. Gary will also highlight our continued investments in our customers’ experience and the latest developments with our security ecosystem partners.

1:10PM-1:15PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

1:15PM-2:30PM

Content Tracks

1:15PM-2:30PM

Email Security Roadmap

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Robert Holmes, VP & GM of Email Fraud Defense, Proofpoint

Luis Blando, SVP of Engineering – Security Products and Services Group, Proofpoint


Because attackers don't stop, we don't stop innovating and advancing our email security capabilities. Join this session as Proofpoint product experts unveil the blueprint for the future of Proofpoint Email Security. You'll hear about our long-term vision as well as soon to be available capabilities.

1:15PM-2:00PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director of Security Research, Proofpoint


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

2:00PM-2:30PM

Protecting Your Cloud Data with Proofpoint CASB

Itir Clarke, Senior Product Marketing Manager, Proofpoint


With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

1:15PM-2:00PM

The New Blue Print: The Future of People-Centric Information Protection

David Knight, EVP and GM of Cloud Security Group, Proofpoint

Mayank Choudhary, SVP of Product, Insider Threat Management, Proofpoint


A people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy for Enterprise DLP and Insider Threat Management. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era.

2:00PM-2:30PM

Best Practices: Building an Information Protection Program

Tim Choi, VP of Product Marketing, Proofpoint

Alex Kremer, VP of Chief Architect, Proofpoint


Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.

1:15PM-2:30PM

Security Awareness Roadmap

Matt Lane, Sr. Product Manager, Proofpoint

Mark Wuslich, Sr. Product Manager, Proofpoint

Raghen Morrow, Product Manager of Business Intelligence, Proofpoint

Ali Mazzotta, Product Manager, Proofpoint

Al Himler, Sr. Director of Product Management, Proofpoint

Susan Mackowiak, Sr. Director of Program Content, Proofpoint


Learn about planned enhancements to the Proofpoint Security Awareness platform, how they can enable you to effectively execute your programme, and our future plans to extend and enhance our training content. Covered areas will include reporting, assessments, user management, customization center, and integration with the broader Proofpoint technology portfolio. Attendees will learn how to deliver the best ROI in 2020 and beyond.

1:15PM-2:00PM

Introducing Nexus Risk Dashboard

Julie Sutton, Information Security Manager, City and County of Denver

Chris White, CISO, IPG

Jenn Cheng, Director of Product Marketing, Proofpoint


Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.

2:00PM-2:30PM

Speaking Your CFO's Language

Paul Auvil, Chief Financial Officer, Proofpoint

Lucia Milica, Global Resident CISO, Proofpoint


Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.

2:30PM-3:00PM

The New Blueprint with Proofpoint Security and Compliance

David Knight, EVP and GM of Security Products, Proofpoint


Whether your challenge is business email compromise, cloud security, or securing newly remote workers, Proofpoint’s people-centric roadmap is delivering the innovations to keep your people protected. Join Proofpoint’s David Knight to hear about what we’ve delivered and what we’re building across our email security, cloud security, information protection, and security awareness training product lines. From new detection techniques to stop the latest attacker innovations to incredible new risk analytics, this session will help you look at your own security blueprint with new eyes.

3:00PM-3:05PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

Day 2

All agenda times listed in AEST

Session

12:00PM-12:10PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

12:10PM-1:10PM

Content Tracks

12:10PM-12:40PM

How to Protect Your Customers, the Public, Employees, and the Supply Chain Through DMARC

Amin Manzoori, Email Fraud Defense Specialist, Proofpoint

Adrian Covich, Senior Director of Technical Sales, Proofpoint


With staggering losses of $1.7 billion in 2019, business email compromise (BEC) is a crucial attack issue for organisations and government agencies to protect against. As these threats don't typically include malware or detectable malicious intent, protecting against them is not an easy task. The DMARC (Domain-based Message Authentication Reporting and Conformance) standard is one of the most powerful and proactive weapons to date in the fight today’s advanced email threats including BEC and consumer phishing. However, many organisations have not implemented email authentication best practices and may be unknowingly exposing themselves to cybercriminals. This session will explain how to you can help eliminate the impact of email fraud, gain granular visibility across your email ecosystem and implement authentication with confidence.

12:40PM-1:10PM

Reducing Phishing Attacks and Operational Costs through Automation

Tanner Luxner, Product Marketing Manager, Proofpoint


With email as an organisation's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

12:10PM-12:40PM

Best Practices: Office 365 with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

12:40PM-1:10PM

Leverage VAPs as a Blueprint to Apply Adaptive Controls

Gary Hayslip, CISO, Softbank Investment Advisors

Brett Shaw, Senior Product Marketing Manager, Proofpoint

Neko Papez, Product Marketing Manager, Proofpoint


In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how to deploy solutions for better protection against future attacks.

12:10PM-12:40PM

Panel discussion: The Evolution of the Insider Threat

Stacey Champagne, Insider Threat Investigations Lead, PayPal

Gary Hayslip, CISO of Softbank Investment Advisors

Rob Oden, Cybersecurity Architect, L3 Harris

Mike McKee, EVP and GM of Insider Threat Management, Proofpoint


Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organisations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutionsrelated to insider threat management.

12:40PM-1:10PM

Introducing the Next Generation of People-Centric Insider Threat Management Technology

Mayank Choudhary, SVP for Products, Insider Threat Management, Proofpoint


Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

12:10PM-12:40PM

Identifying Risk in Your Organisation

Andrew Warren-Nichols, Security Awareness Specialist, Proofpoint


Walk-through our current reporting tools to understand how you can identify risk in your organisation.

12:40PM-1:10PM

How to effectively measure and report real value for security awareness training

Alan Levine, CISO Advisor


The need for security awareness training has never been more acute; increasing threats, WFH and endless regulatory compliance. Your programs are making a difference; but how do you show it? Learn how to demonstrate value and build the case to expand your program and acquire critical resources.

12:10PM-12:40PM

Threat Intelligence Observations for 2020 and Beyond

Josh Burgess, Lead Technical Strategic Advisor, CrowdStrike


Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.


Attend this session to learn about:

• The ransomware cyber threat landscape

• Using strategic, operational and tactical assessments to shine lights on points of exposure

• How technical knowledge, intel, threat hunting and partners can help pave the way forward

•Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint

12:40PM-1:10PM

Mitigating Risk in a Distributed Workforce

Kelsey Nelson, Senior Product Marketing Manager, Okta


While it would have been nice if threat actors had taken a break during the initial COVID lockdowns, what we actually saw was a significant increase in cyber attacks -- particularly social engineering attacks, such as phishing. As this 'new normal' continues to evolve, businesses need a way to mitigate these attacks and protect their increasingly distributed workforce.


In this session, we'll talk through the role of risk-based authentication in modern, zero trust security as well as how integrations across security technologies, such as with Proofpoint, Okta + CrowdStrike, can enhance security and also productivity -- wherever your workers are, and whatever tools they're using.

1:10PM-1:20PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint

1:20PM-2:20PM

Risky Business Live

Helen Patton, Chief Information Security Officer, The Ohio State University

Krishnan Chellakarai, Chief Information Security Officer, Gilead Sciences

Sheldon Cuffie, VP & Enterprise CISO, American Family Insurance

Patrick Gray, Risky.Biz

Sherrod DeGrippo, Sr. Director of Threat Research and Detection, Proofpoint

2:20PM-2:30PM

Protect Studio Updates

Alex Lei, Senior VP of APJ Sales, Proofpoint

Crispin Kerr, AVP of Regional Sales ANZ, Proofpoint

Maiwand Youssofzay, Country Manager of ASEAN, Proofpoint

Adrian Covich, Senior Director of Technical Sales APAC, Proofpoint