Wisdom 2020

2-3 September 2020
Proofpoint Security Awareness

Learn More

Protect Global

9-10 September 2020

Learn More

Frequently Asked Questions

Get all the answers here.

Learn More

See our blueprint for security and compliance to design your own framework for success

The strongest organizations have a well-designed blueprint for cybersecurity and compliance. Proofpoint has a comprehensive strategy to share with you—along with the solutions and threat intelligence to back it up. Join us at Protect 2020, online, and we’ll roll up our sleeves and lay it all out in front of you.

Reasons to attend Protect 2020:

  • Hear compelling keynotes from Proofpoint execs and industry experts
  • Discover how top cybersecurity and compliance professionals are protecting their organizations and people with Proofpoint products
  • Learn about new Proofpoint products that will accelerate your journey to people-centric security and compliance
  • Learn how to access and apply data to fortify your security and compliance posture
  • Explore topics designed to help CISO leadership elevate their game in people-centric security and compliance

Thank you for your submission.

Featured Speakers

Gary Steele,

Chief Executive Officer, Proofpoint

Ryan Kalember,

EVP, Cybersecurity Strategy, Proofpoint

David Knight,

EVP and GM, Security Products, Proofpoint

Sherrod DeGrippo,

Sr. Director, Threat Research and Detection, Proofpoint

Lucia Milică,

Resident CISO, Proofpoint

Patrick Gray,

Risky.Biz

Tracks

Real strategies. Actionable insights. Plan your experience at Protect 2020.

Cloud Security

Our Cloud Security track delivers real-world insight, best practices and frameworks to design and build an effective cloud security architecture. Learn how Proofpoint technology can help ease the transition to cloud services—zero-trust secure. Participants will:

  • Hear the real-world experiences of peers making the transition to the cloud
  • Preview the future direction of Proofpoint cloud security technologies
  • Learn how email and cloud threats are blended together by attackers to target your people
  • Learn how to secure cloud applications and data, as well as scale access for remote workers
  • See how the zero-trust model can propel your organization to cloud security

Email Security

In our Email Security track, you’ll meet with Proofpoint customers, researchers and product leaders to explore the evolving threat landscape and best practices to defend against email threats. You’ll get the information you need to build your blueprint to protect against the No.1 threat vector, including:

  • An overview of the evolving threat landscape with Proofpoint threat research
  • Customer-led discussions featuring strategies and best practices for email security
  • A preview of Proofpoint email security product strategy, innovations and road map
  • Learn how insights into cloud threats will augment your security posture in email protection
  • Practitioner sessions covering practical implementation of email security controls

Information Protection

In the post-perimeter, work-from-home world, a detailed plan for information protection is essential. In this track, you’ll learn how to prevent data loss across email, cloud and endpoint. You’ll also learn about managing incident response and preventing insider-led security breaches, and more. Sessions include:

  • An overview of the Proofpoint people-centric information protection vision and strategy
  • Practitioner discussions covering practical implementation of modern information protection strategies
  • Guided tours of new innovation within the Proofpoint information protection platform
  • Panels featuring customers and experts discussing strategies and best practices

Modern Compliance

Do you have a blueprint for success in compliance? This track gives you one—exploring the latest in regulatory trends and compliance technologies. Join us for sessions highlighting the most impactful ways to stay ahead of digital paradigms as a regulated organization while adding value for your global enterprise. Here, you will discover:

  • A people-centric compliance vision and road map for use during digital transformation
  • Best practices for social media and digital communications compliance
  • Value creation for organizations focusing on reducing compliance and regulatory risks
  • Insights from industry leaders who share real-world experiences in compliance

Security Awareness Training

Building a culture of security means designing superior training. This track explores how others extend technological controls with training, and details how our Very Attacked People™ (VAP) insights enable targeted training based on threats seen in the wild. You’ll also:

  • Learn how security awareness training can complement existing security technology
  • Understand how a security-focused culture can positively affect your security posture
  • See how Proofpoint threat intelligence can shape a security awareness program that is effective in affecting behavior change

CISO / Leadership

The architects of security strategies gather to share insights in this special CISO track. Alongside prominent thought leaders, you’ll take away a wealth of best practices and leadership advice on better ways to mitigate risk and justify technology spend. Topics include:

  • Collaborating with your CFO and presenting to the board
  • Introducing new tools and frameworks that define the people-centric blueprint
  • Exploring what’s next for cybersecurity in a post-pandemic economy
 

Agenda


 

Day 1

All agenda times listed in BST (CET -1)

12:30PM-12:45PM

Proofpoint Live from Home

12:45PM-1:15PM

Proofpoint Welcome Keynote with Gary Steele, CEO

Gary Steele, Chief Executive Officer, Proofpoint


Learn about the latest innovations we’re delivering in people-centric security, as well as our continued commitments to delivering new insights that resonate from the SOC to the boardroom. Gary will also highlight our continued investments in our customers’ experience and the latest developments with our security ecosystem partners.

1:15PM-1:25PM

Proofpoint Live from Home

1:25PM-2:30PM

Risky.Biz Live

2:30PM-2:35PM

Proofpoint Live from Home

2:35PM-3:45PM

Content Tracks

2:35PM-3:20PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director of Security Research, Proofpoint


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

3:25PM-3:55PM

Reducing Phishing Attacks and Operational Costs through Automation

Tanner Luxner, Product Marketing Manager, Proofpoint


With email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

2:35PM-3:20PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director of Security Research, Proofpoint


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

3:25PM-3:55PM

Protecting Your Cloud Data with Proofpoint CASB

Itir Clarke, Sr. Product Marketing Manager, Proofpoint


With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

2:35PM-3:20PM

Panel discussion: The Evolution of the Insider Threat

Mike McKee, EVP and GM for Insider Threat Management, Proofpoint


Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutionsrelated to insider threat management.

3:25PM-3:55PM

Coming Soon!

2:35PM-3:20PM

People-Centric Compliance for Your Digital Transformation Journey

Darren Lee, EVP & GM of Compliance and Archiving, Proofpoint


Proofpoint Compliance's vision for the next 1 - 3 years; covering market trends, challenges, and help guide customers on where best to place their compliance investments within an end-to-end technology stack that is or will be going through digital transformation.

3:25PM-3:55PM

Best Practices for Balancing Risk and Reward with Social Media and Digital Communications

Amanda Anderson, Product Marketing Manager, Proofpoint


New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.


In this session, you'll learn:

• Important considerations for how you capture and manage communications data

• How to scale supervision of public-facing channels

• How to avoid common pitfalls and roadblocks

2:35PM-3:20PM

How integrating threat intelligence translates into a superior security awareness program

Mark Guntrip, Director of Product Marketing, Proofpoint


Proofpoint threat intelligence, as well as offering valuable insight into how attackers are targeting people can add significant value to a security awareness program. Learn how Proofpoint obtains visibility and translates it into value for your program.

3:25PM-3:55PM

Security Awareness Training: One CISO’s Journey from "Doubter to Believer"

Alan Levine, CISO Advisor


Hear from a former Fortune 500 CISO, Alan Levine about how he didn’t believe in security awareness training — until a nation-state attack on his organization revealed the value of including users in a defense-in-depth strategy.

2:35PM-3:20PM

An Overdue Shift to People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Sherrod DeGrippo, Senior Director of Threat Research and Detection, Proofpoint


The forces of digital transformation are reshaping work and cyber trends at light speed. This session will explain why the shift to people-centric security is relevant, urgent, and long overdue. We will introduce a new framework with practical guidance for CISOs to implement and evolve their strategy.

3:25PM-3:55PM

Strategies for Engaging with Your Board of Directors

Lucia Milica, Resident CISO, Proofpoint


Today’s CISOs must answer to the business and the board. Benchmarks, maturity models, and frameworks help facilitate those conversations. This session will share such strategies, tools, and data to help you build your next presentation and guarantee the attention of your company board.

4:00PM-4:30PM

The New Blueprint with Proofpoint Security and Compliance

David Knight, EVP and GM of Security Products Proofpoint


Whether your challenge is business email compromise, cloud security, or securing newly remote workers, Proofpoint’s people-centric roadmap is delivering the innovations to keep your people protected. Join Proofpoint’s David Knight to hear about what we’ve delivered and what we’re building across our email security, cloud security, information protection, and security awareness training product lines. From new detection techniques to stop the latest attacker innovations to incredible new risk analytics, this session will help you look at your own security blueprint with new eyes.

4:30PM-4:35PM

Proofpoint Live from Home

Day 2

All agenda times listed in BST (CET -1)

9:30AM-9:45AM

Proofpoint Live from Home

9:50AM-10:55AM

Content Tracks

9:50AM-10:55AM

Email Security Roadmap

Rajneesh Chopra, Vice President of Product Management, Proofpoint

Tony Paterra, Vice President of Product Management, Proofpoint


Because attackers don't stop, we don't stop innovating and advancing our email security capabilities. Join this session as Proofpoint product experts unveil the blueprint for the future of Proofpoint Email Security. You'll hear about our long-term vision as well as soon to be available capabilities.

9:50AM-10:20AM

Best Practices: Office 365 with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

10:20AM-10:55AM

Coming Soon!

9:50AM-10:20AM

Deep Dive: The future of People Centric Information Protection

Tim Choi, VP of Product Marketing, Proofpoint

Alex Kremer, VP of Chief Architect, Proofpoint


Take a deep dive into the Information Protection platform. Tour the new innovations, and learn about key platform design principles to address privacy, anonymization, access controls, and more. If you have email DLP, CASB, or ITM, hear how you can get started today.

10:20AM-10:55AM

Introducing the Next Generation of People-Centric Insider Threat Management Technology

Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint


Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

9:50AM-10:55AM

Roadmap: What's Next In the Evolution of Compliance & Recordkeeping Technology

Rick Dales, Vice President of Product Management, Proofpoint

Chris Tebo, VP of Engineering and Archiving CTO, Proofpoint


Proofpoint Product and Engineering come together to talk about how the digital communications landscape is evolving, what this means for compliance & information management teams, and how Proofpoint compliance products will evolve to support these changes.

9:50AM-10:55AM

Security Awareness Training Roadmap


Learn about planned enhancements to the Proofpoint Security Awareness platform, how they can enable you to effectively execute your programme, and our future plans to extend and enhance our training content. Covered areas will include reporting, assessments, user management, customization center, and integration with the broader Proofpoint technology portfolio. Attendees will learn how to deliver the best ROI in 2020 and beyond.

9:50AM-10:20AM

Coming Soon!

10:20AM-10:55AM

Coming Soon!

10:50AM-11:00AM

Proofpoint Live from Home

11:05AM-12:00PM

Content Tracks

11:00AM-11:30AM

Best Practices: Preventing Business Email Compromise and Email Account Compromise

Jessica Greer, Director of Professional Services, Proofpoint

Mike Olden, Principal Consultant, Proofpoint


Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC.

11:30AM-12:00PM

Best Practices: Implementing DMARC for Inbound Email

Rob Fleming, Principal Consultant, Proofpoint

Christophe Wolfhugel, Principal Consultant, Proofpoint


Many organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security.

11:00AM-12:00PM

Cloud Security Roadmap

Jessica Greer, Director of Professional Services, Proofpoint

Proofpoint Product Management Team


Learn how Proofpoint is innovating to enable organizations to make the shift to the cloud secure. Our cloud security roadmap incorporates CASB, zero trust, application security and isolation technologies to provide a solution that solves the business problems of transitioning security to the cloud.

11:00AM-11:30AM

Best Practices: Building an Information Protection Program

Justin Collins, Senior Director of Professional Services, Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint


Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.

11:30AM-12:00PM

Best Practices: Office 365 Security with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

11:00AM-12:00PM

Tech Session: How to Mitigate Compliance Risk with Intelligent Supervision

Rick Dales, Vice President of Product Management, Proofpoint

John Pepe, Market Development Principal, Financial Services, Proofpoint


Businesses are becoming aware of the need to monitor employee communications and mitigate risk associated with electronic communications. Once the domain for primarily financial services organizations, supervision technology now extends to many other vertical markets and industries. Discover the latest approach to protect your organization from legal, regulatory, and reputational risk. Join us to learn insights on:


• What does a Compliance Risk Mitigation program look like and why is it critical for your organization, including trends driving adoption

• How Proofpoint can help you implement your Compliance Risk Mitigation program

• What best practices can be shared through learnings from customers who’ve started their journey

11:00AM-11:30AM

Identifying Risk in Your Organization

Raghen Morrow, Product Manager, Proofpoint


Walk-through our current reporting tools to understand how you can identify risk in your organization.

11:30AM-12:00PM

How to effectively measure and report real value for security awareness training

Robert Shields, Sr. Product Marketing Manager, Proofpoint


The need for security awareness training has never been more acute; increasing threats, WFH and endless regulatory compliance. Your programs are making a difference; but how do you show it? Learn how to demonstrate value and build the case to expand your program and acquire critical resources.

11:00AM-11:30AM

Speaking Your CFO's Language

Paul Auvil, Chief Financial Officer, Proofpoint


Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.

11:30AM-12:00PM

Introducing Nexus Risk Dashboard


Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.

12:00PM-12:10PM

Proofpoint Live from Home

12:10-12:40PM

Coming Soon!

12:40PM-1:00PM

Proofpoint Live from Home

 

Day 1

All agenda times listed in BST (CET -1)

Session

12:30PM-12:45PM

Proofpoint Live from Home

12:45PM-1:15PM

Proofpoint Welcome Keynote with Gary Steele, CEO

Gary Steele, Chief Executive Officer, Proofpoint


Learn about the latest innovations we’re delivering in people-centric security, as well as our continued commitments to delivering new insights that resonate from the SOC to the boardroom. Gary will also highlight our continued investments in our customers’ experience and the latest developments with our security ecosystem partners.

1:15PM-1:25PM

Proofpoint Live from Home

1:25PM-2:30PM

Risky.Biz Live

2:30PM-2:35PM

Proofpoint Live from Home

2:35PM-3:55PM

Content Tracks

2:35PM-3:20PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director of Security Research, Proofpoint


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

3:25PM-3:55PM

Reducing Phishing Attacks and Operational Costs through Automation

Tanner Luxner, Product Marketing Manager, Proofpoint


With email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

2:35PM-3:20PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director of Security Research, Proofpoint


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

3:25PM-3:55PM

Protecting Your Cloud Data with Proofpoint CASB

Tanner Luxner, Product Marketing Manager, Proofpoint


With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

2:35PM-3:20PM

Panel discussion: The Evolution of the Insider Threat

Mike McKee, EVP and GM for Insider Threat Management, Proofpoint


Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutionsrelated to insider threat management.

3:25PM-3:55PM

Coming Soon!

2:35PM-3:20PM

People-Centric Compliance for Your Digital Transformation Journey

Darren Lee, EVP & GM of Compliance and Archiving, Proofpoint


Proofpoint Compliance's vision for the next 1 - 3 years; covering market trends, challenges, and help guide customers on where best to place their compliance investments within an end-to-end technology stack that is or will be going through digital transformation.

3:25PM-3:55PM

Best Practices for Balancing Risk and Reward with Social Media and Digital Communications

Amanda Anderson, Product Marketing Manager, Proofpoint


New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.


In this session, you'll learn:

• Important considerations for how you capture and manage communications data

• How to scale supervision of public-facing channels

• How to avoid common pitfalls and roadblocks

2:35PM-3:20PM

How integrating threat intelligence translates into a superior security awareness program

Mark Guntrip, Director of Product Marketing, Proofpoint


Proofpoint threat intelligence, as well as offering valuable insight into how attackers are targeting people can add significant value to a security awareness program. Learn how Proofpoint obtains visibility and translates it into value for your program.

3:25PM-3:55PM

Security Awareness Training: One CISO’s Journey from "Doubter to Believer"

Alan Levine, CISO Advisor


Hear from a former Fortune 500 CISO, Alan Levine about how he didn’t believe in security awareness training — until a nation-state attack on his organization revealed the value of including users in a defense-in-depth strategy.

2:35PM-3:20PM

An Overdue Shift to People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Sherrod DeGrippo, Senior Director of Threat Research and Detection, Proofpoint


The forces of digital transformation are reshaping work and cyber trends at light speed. This session will explain why the shift to people-centric security is relevant, urgent, and long overdue. We will introduce a new framework with practical guidance for CISOs to implement and evolve their strategy.

3:25PM-3:55PM

Strategies for Engaging with Your Board of Directors

Lucia Milica, Resident CISO, Proofpoint


Today’s CISOs must answer to the business and the board. Benchmarks, maturity models, and frameworks help facilitate those conversations. This session will share such strategies, tools, and data to help you build your next presentation and guarantee the attention of your company board.

4:00PM-4:30PM

The New Blueprint with Proofpoint Security and Compliance

David Knight, EVP and GM of Security Products Proofpoint


Whether your challenge is business email compromise, cloud security, or securing newly remote workers, Proofpoint’s people-centric roadmap is delivering the innovations to keep your people protected. Join Proofpoint’s David Knight to hear about what we’ve delivered and what we’re building across our email security, cloud security, information protection, and security awareness training product lines. From new detection techniques to stop the latest attacker innovations to incredible new risk analytics, this session will help you look at your own security blueprint with new eyes.

4:30PM-4:35PM

Proofpoint Live from Home

Day 2

All agenda times listed in BST (CET -1)

Session

9:30AM-9:45AM

Proofpoint Live from Home

9:50AM-10:55AM

Content Tracks

9:50AM-10:55AM

Email Security Roadmap

Rajneesh Chopra, Vice President of Product Management, Proofpoint

Tony Paterra, Vice President of Product Management, Proofpoint


Because attackers don't stop, we don't stop innovating and advancing our email security capabilities. Join this session as Proofpoint product experts unveil the blueprint for the future of Proofpoint Email Security. You'll hear about our long-term vision as well as soon to be available capabilities.

9:50AM-10:20AM

Best Practices: Office 365 with Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

10:20AM-10:55AM

Coming Soon!

9:50AM-10:20AM

Deep Dive: The future of People Centric Information Protection

Tim Choi, VP of Product Marketing, Proofpoint

Alex Kremer, VP of Chief Architect, Proofpoint


Take a deep dive into the Information Protection platform. Tour the new innovations, and learn about key platform design principles to address privacy, anonymization, access controls, and more. If you have email DLP, CASB, or ITM, hear how you can get started today.

10:20AM-10:55AM

Introducing the Next Generation of People-Centric Insider Threat Management Technology

Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint


Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

9:50AM-10:55AM

Roadmap: What's Next In the Evolution of Compliance & Recordkeeping Technology

Rick Dales, Vice President of Product Management, Proofpoint

Chris Tebo, VP of Engineering and Archiving CTO, Proofpoint


Proofpoint Product and Engineering come together to talk about how the digital communications landscape is evolving, what this means for compliance & information management teams, and how Proofpoint compliance products will evolve to support these changes.

9:50AM-10:55AM

Security Awareness Training Roadmap

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


Learn about planned enhancements to the Proofpoint Security Awareness platform, how they can enable you to effectively execute your programme, and our future plans to extend and enhance our training content. Covered areas will include reporting, assessments, user management, customization center, and integration with the broader Proofpoint technology portfolio. Attendees will learn how to deliver the best ROI in 2020 and beyond.

9:50AM-10:20AM

Coming Soon!

10:20AM-10:55AM

Coming Soon!

10:55AM-11:00AM

Proofpoint Live from Home

11:05AM-12:00PM

Content Tracks

11:00AM-11:30AM

Best Practices: Preventing Business Email Compromise and Email Account Compromise

Jessica Greer, Director of Professional Services, Proofpoint

Mike Olden, Principal Consultant, Proofpoint


Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC.

11:30AM-12:00PM

Best Practices: Implementing DMARC for Inbound Email

Rob Fleming, Principal Consultant, Proofpoint

Christophe Wolfhugel, Principal Consultant, Proofpoint


Many organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security.

11:00AM-12:00PM

Cloud Security Roadmap

Proofpoint Product Management Team


Learn how Proofpoint is innovating to enable organizations to make the shift to the cloud secure. Our cloud security roadmap incorporates CASB, zero trust, application security and isolation technologies to provide a solution that solves the business problems of transitioning security to the cloud.

11:00AM-11:30AM

Best Practices: Building an Information Protection Program

Justin Collins, Senior Director of Professional Services, Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint


Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.

11:30AM-12:00PM

Best Practices: Office 365 Security with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

11:00AM-12:00PM

Tech Session: How to Mitigate Compliance Risk with Intelligent Supervision

Rick Dales, Vice President of Product Management, Proofpoint

John Pepe, Market Development Principal, Financial Services, Proofpoint


Businesses are becoming aware of the need to monitor employee communications and mitigate risk associated with electronic communications. Once the domain for primarily financial services organizations, supervision technology now extends to many other vertical markets and industries. Discover the latest approach to protect your organization from legal, regulatory, and reputational risk. Join us to learn insights on:


• What does a Compliance Risk Mitigation program look like and why is it critical for your organization, including trends driving adoption

• How Proofpoint can help you implement your Compliance Risk Mitigation program

• What best practices can be shared through learnings from customers who’ve started their journey

11:00AM-11:30AM

Identifying Risk in Your Organization

Raghen Morrow, Product Manager, Proofpoint


Walk-through our current reporting tools to understand how you can identify risk in your organization.

11:30AM-12:00PM

How to effectively measure and report real value for security awareness training

Robert Shields, Sr. Product Marketing Manager, Proofpoint


The need for security awareness training has never been more acute; increasing threats, WFH and endless regulatory compliance. Your programs are making a difference; but how do you show it? Learn how to demonstrate value and build the case to expand your program and acquire critical resources.

11:00AM-11:30AM

Speaking Your CFO's Language

Paul Auvil, Chief Financial Officer, Proofpoint


Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.

11:30AM-12:00PM

Introducing Nexus Risk Dashboard


Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.

12:00PM-12:10PM

Proofpoint Live from Home

12:10PM-12:40PM

Coming Soon!

12:40PM-1:00PM

Proofpoint Live from Home