Agenda and Speakers
Agenda and Speakers
Agenda

Straight talk and insight from industry titans

Join us for a forward-looking itinerary packed with the learnings and networking you'll need to stay ahead.

Agenda
What's on

Tailor your agenda with transformative connections and learning

Day 1
Day 2
Day 3
7:00 AM - 6:00 PM

Registration

Add to calendar
9:00 AM - 4:00 PM

Certification Labs & Exams

Add to calendar
9:00 AM - 4:00 PM

Discovery Labs

Add to calendar
1:00 PM - 4:00 PM

Customer Meetings

Add to calendar
2:00 PM - 4:00 PM

Women Who Cyber

Add to calendar
4:00 PM - 5:30 PM

Breakouts

Spotlight Theater
4:00 PM - 5:30 PM

Sessions to be announced

4:00 PM - 6:00 PM

Welcome Reception

Add to calendar
7:00 AM - 9:00 AM
7:00 AM - 9:00 AM

First-Timer Breakfast

Add to calendar
7:00 AM - 6:30 PM

Registration

Add to calendar
7:00 AM - 9:00 AM
9:00 AM - 10:05 AM

Opening Keynote

Add to calendar
10:20 AM - 10:55 AM
11:00 AM - 12:00 PM

Roadmap Session

Add to calendar
12:00 PM - 1:00 PM
12:00 PM - 3:45 PM

Certification Labs & Exams

Add to calendar
12:00 PM - 3:45 PM

Discovery Labs

Add to calendar
12:00 PM - 3:45 PM
1:00 PM - 3:45 PM

Breakouts

Maximize: Email Protection
Stop: Human-centric Threats
Transform: Data Security
Empower: Behavior and Culture
Spotlight Theater
1:00 PM - 1:30 PM

Building a High-Efficiency Email SOC: Lessons from the Field

1:35 PM - 2:05 PM

Streamlining SOC Operations with Agentic AI: Roadmap

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM

Proofpoint Protection in an M365-First World: Data That Drives the Decision

2:45 PM - 2:55 PM

Proofpoint Protection in an M365-First World: Data That Drives the Decision

2:55 PM - 3:05 PM

Proofpoint Protection in an M365-First World: Data That Drives the Decision

3:10 PM - 3:20 PM

Revolutionizing Your SOC Investigations with Threat Protection Workbench

3:20 PM - 3:30 PM

Revolutionizing Your SOC Investigations with Threat Protection Workbench

3:30 PM - 3:45 PM

Revolutionizing Your SOC Investigations with Threat Protection Workbench

1:00 PM - 1:30 PM

Reducing Risk and Taming Complexity with an Integrated Platform

1:35 PM - 2:05 PM

Defend Against Two Sides of Account Compromise

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM

Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

2:45 PM - 2:55 PM

Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

2:55 PM - 3:05 PM

Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

3:10 PM - 3:20 PM

From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

3:20 PM - 3:30 PM

From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

3:30 PM - 3:45 PM

From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

1:00 PM - 1:30 PM

Making Unified Data Security a Reality with Proofpoint

1:35 PM - 2:05 PM

Stop Insider Risks Before They Become Headlines

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM

Proofpoint Data Security Innovations You Shouldn't Miss

2:45 PM - 2:55 PM

Proofpoint Data Security Innovations You Shouldn't Miss

2:55 PM - 3:05 PM

Proofpoint Data Security Innovations You Shouldn't Miss

3:10 PM - 3:20 PM

Proofpoint for Proofpoint: Securing Enterprise AI

3:20 PM - 3:30 PM

Proofpoint for Proofpoint: Securing Enterprise AI

3:30 PM - 3:45 PM

Proofpoint for Proofpoint: Securing Enterprise AI

1:00 PM - 1:30 PM

Proving It Works: How to Effectively Measure Security Behavior Change

1:35 PM - 2:05 PM

Fusing Threat Intelligence with Targeted Risk Education

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM

Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

2:45 PM - 2:55 PM

Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

2:55 PM - 3:05 PM

Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

3:10 PM - 3:20 PM

Security Culture in the Real World: Stories That Inspire Action

3:20 PM - 3:30 PM

Security Culture in the Real World: Stories That Inspire Action

3:30 PM - 3:45 PM

Security Culture in the Real World: Stories That Inspire Action

12:15 PM - 3:45 PM

Sessions to be announced

1:00 PM - 4:00 PM

Customer Meetings

Add to calendar
4:00 PM - 5:00 PM

Guest Speaker - To be announced

Add to calendar
5:30 PM - 6:00 PM

Travel to Nashville Nights

Add to calendar
6:00 PM - 9:00 PM

Nashville Nights at Proofpoint Protect 2025

Add to calendar
7:00 AM - 9:00 AM
7:00 AM - 3:00 PM

Registration

Add to calendar
9:00 AM - 10:30 AM
Power Series Live! Navigating the Ever-Evolving Threat Landscape

With trillions of email and cloud-based attacks occurring annually, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.

Add to calendar
10:30 AM - 10:45 AM

Break

10:45 AM - 1:40 PM

Certification Labs & Exams

Add to calendar
10:45 AM - 1:40 PM

Customer Meetings

Add to calendar
10:45 AM - 1:40 PM

Discovery Labs

Add to calendar
10:45 AM - 1:40 PM
10:45 AM - 1:40 PM

Breakouts

Maximize: Email Protection
Stop: Human-centric Threats
Transform: Data Security
Empower: Behavior and Culture
10:45 AM - 11:15 AM

Maximize the Full Potential of Core Email Protection

11:20 AM - 11:50 AM

Inside Nexus: How Proofpoint Uses AI to Stop Email Threats

12:35 PM - 12:45 PM

2025 in Email Threats: What Hit, What Hurt, What’s Next

12:45 PM - 12:55 PM

2025 in Email Threats: What Hit, What Hurt, What’s Next

12:55 PM - 1:05 PM

2025 in Email Threats: What Hit, What Hurt, What’s Next

1:10 PM - 1:20 PM

BEC 3.0: Deepfakes, Voice Clones, and the Next $1 Billion Fraud

1:20 PM - 1:30 PM

BEC 3.0: Deepfakes, Voice Clones, and the Next $1 Billion Fraud

1:30 PM - 1:40 PM

BEC 3.0: Deepfakes, Voice Clones, and the Next $1 Billion Fraud

10:45 AM - 11:15 AM

From Email to Everywhere: Stopping Threats Across Digital Channels

11:20 AM - 11:50 AM

Improving Email Deliverability: From Users to Applications

12:35 PM - 12:45 PM

Email Authentication: What the Future Holds

12:45 PM - 12:55 PM

Email Authentication: What the Future Holds

12:55 PM - 1:05 PM

Email Authentication: What the Future Holds

1:10 PM - 1:20 PM

Session to be announced

1:20 PM - 1:30 PM

Session to be announced

1:30 PM - 1:40 PM

Session to be announced

10:45 AM - 11:15 AM

Time to Shift to Modern Human-Centric DLP

11:20 AM - 11:50 AM

Guardrails for GenAI: A Data Security Playbook

12:35 PM - 12:45 PM

Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

12:45 PM - 12:55 PM

Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

12:55 PM - 1:05 PM

Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

1:10 PM - 1:20 PM

Mastering a Hybrid Approach to Email DLP

1:20 PM - 1:30 PM

Mastering a Hybrid Approach to Email DLP

1:30 PM - 1:40 PM

Mastering a Hybrid Approach to Email DLP

10:45 AM - 11:15 AM

A Roadmap for Human Risk Resilience via Insight, Automation & Contextual Learning

11:20 AM - 11:50 AM

Operationalizing Human Risk Data to Drive Behavior Change

12:35 PM - 12:45 PM

From Awareness to Action with Proofpoint's Maturity Model

12:45 PM - 12:55 PM

From Awareness to Action with Proofpoint's Maturity Model

12:55 PM - 1:05 PM

From Awareness to Action with Proofpoint's Maturity Model

1:10 PM - 1:20 PM

Shaping Tomorrow: Using AI to Scale and Elevate Your Program

1:20 PM - 1:30 PM

Shaping Tomorrow: Using AI to Scale and Elevate Your Program

1:30 PM - 1:40 PM

Shaping Tomorrow: Using AI to Scale and Elevate Your Program

11:50 AM - 12:35 PM
1:45 PM - 2:00 PM

Farewell Closing Message

Add to calendar

*subject to changes

Learning tracks
Dedicated content

Transform human risk into resilience

Powerful tracks designed to help you maximize your cybersecurity investment

Core tracks

Maximize: Email Protection

Explore the latest changes in the email threat landscape and how Proofpoint customers stay ahead of attackers. Grab your front-row seat to evolving best practices, and get a preview into our email protection innovation roadmap featuring agentic AI to power up your SOC.

Stop: Human-centric Threats

Discover how attackers execute sophisticated, multichannel, multistage attacks that extend beyond email. Secure your spot to explore effective security measures, new feature enhancements, and peer-driven best practices for stopping human-centric threats with a comprehensive defense.

Transform: Data Security

Data exfiltration, exposure, and insider threats put sensitive information at risk. Protecting your organization’s most valuable data across cloud, endpoint, and email is a human-centric challenge.

Empower: Secure Behavior and Culture

Empowering the people within your organization to be part of the security solution was once just a dream. Now it is reality. Discover the perfect balance between people and technology.

2025 Speakers
Featured speakers

Hear directly from the best in the business.
All in one place.

Who should attend
You belong here

Great defense requires elite defenders—like you. Proofpoint Protect 2025 serves:

Security Analysts and Engineers
Security Analysts and Engineers

Security Analysts and Engineers

System and Network Admins
Systems
and Network Admins

Systems
and Network Admins

Researchers and Threat Analysts
Researchers and Threat Analysts

Researchers and Threat Analysts

CISOs and Security Leadership
CISOs and Security Leadership

CISOs and Security Leadership

From front-line defenders to strategic visionaries: Secure your future when learning about what's next.

Need help justifying your trip?
Download our business justification letter as a template for your business case.