General Sessions
![]() |
![]() |
Proofpoint Welcome Keynote with Gary Steele, CEO Gary Steele, CEO, Proofpoint |
Risky Business Live - CISO Panel Helen Patton, Chief Information Security Officer, The Ohio State University |
Watch now | Watch now |
![]() |
![]() |
Risky Business Live - Threat Research Session Patrick Gray, Risky.Biz |
The Best Defense: A Brief History of Red vs. Blue in Ryan Kalember, EVP, Cybersecurity Strategy, Proofpoint |
Watch now | Watch now |
![]() |
|
A Face in the Cloud: Tracking the Evolution of Chris Lockery, Deputy CISO, Cigna |
|
Watch now | |
Email Security
A Blueprint to Defend Against Business Email Compromise (BEC) and Email Account Compromise (EAC)
BEC and EAC have cost organizations $26B over a three-year-period. How can your organization best protect itself against these costly threats? Join this Proofpoint customer session to hear about strategies, best practices and lessons learned to defend against BEC and EAC.
Speakers:
Brian Uhreen, Manager Security Operations, Finning International
Sara Pan, Senior Product Marketing Manager, Proofpoint
Best Practices: Implementing DMARC for Inbound Email
Many organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security.
Speakers:
Rob Fleming, Principal Consultant, Proofpoint
Christophe Wolfhugel, Principal Consultant, Proofpoint
Best Practices: Office 365 with Proofpoint
As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.
Speakers:
Michael Beninda, Director of Professional Services, Proofpoint
James Knight, Principal Consultant, Proofpoint
Best Practices: Preventing Business Email Compromise and Email Account Compromise
Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC.
Speakers:
Jessica Greer, Director of Professional Services, Proofpoint
Mike Olden, Principal Consultant, Proofpoint
Leverage VAPs as a Blueprint to Apply Adaptive Controls
In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks.
Speaker:
Brett Shaw, Sr. Product Marketing Manager, Proofpoint
Neko Papez, Product Marketing Manager, Proofpoint
Gary Hayslip, CISO, Softbank Investment Advisors
Reducing Phishing Attacks and Operational Costs through Automation
With email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.
Speakers:
Grover Newborn, Sr. Security Engineer, CoStar
Tanner Luxner, Product Marketing Manager, Proofpoint
Stopping Identity Deception with DMARC
Identity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC.
Speakers:
Jason Carter, IT Manager, Florida State University
Tanner Luxner, Product Marketing Manager, Proofpoint
Threat Actors' New Blueprint: Combining Email and Cloud Threats
The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.
Speakers:
Chris Iezzoni, Field Intelligence Director, Proofpoint
Roie Cohen Duwek, Director of Security Research, Proofpoint
Cloud Security
Best Practices: Detecting, Notifying, and Alerting on Account Compromise
Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.
Speakers:
Justin Collins, Senior Director of Professional Services, Proofpoint
Jessica Greer, Director of Professional Services, Proofpoint
Best Practices: Governing third-party OAuth apps and scripts
If you are looking for a framework to governing third-party OAuth apps and reducing your attack surface, look no further than Proofpoint CASB. In this workshop, you will learn how to defend against malicious apps, evaluate new authorizations and existing apps for risk and define app governance policies.
Speakers:
Izak Karmona, Principal Consultant, Proofpoint
Nikos Nikolaou, Director of Professional Services, Proofpoint
Best Practices: Office 365 Security with Proofpoint
As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.
Speakers:
Michael Beninda, Principal Consultant - Professional Services, Proofpoint
James Knight, Principal Consultant - Professional Services, Proofpoint
Deploying Zero Trust with Proofpoint
Zero trust is a term that is being used broadly, but what does it really mean? And what does it take for an organization to adopt a zero trust architecture? For many, starting the deployment of zero trust technology can be quick - see how Proofpoint can start you on your journey.
Speakers:
Yacov (Jack) Kotev, Security Engineer, Outbrain
Kobi Seviliya, Director of Global IT, Outbrain
Chen Nisnkorn,Sr. Director, Technical Sales, Proofpoint
Eric Schwake, Sr. Manager, Product Marketing, Proofpoint
Leverage VAPs and Cloud Insights as a Blueprint to Apply Adaptive Controls
In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) Intelligence and cloud threat insights as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how to deploy solutions for better protection against future attacks.
Speakers:
Gary Haysli, CISO, Softbank Investment Advisors
Brett Shaw, Sr. Product Marketing Manager, Proofpoint
Neko Papez, Product Marketing Manager, Proofpoint
Protecting Your Cloud Data with Proofpoint CASB
With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.
Speakers:
Brian Tschinkel, CISO, Higher Education
Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
Itir Clarke, Sr. Product Marketing Manager, Proofpoint
Technology Strategies to Better Secure the All-Remote Enterprise
The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.
Speakers:
Lucia Milica, Resident CISO, Proofpoint
John Checco, Resident CISO, Proofpoint
Threat Actors' New Blueprint: Combining Email and Cloud Threats
The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.
Speakers:
Chris Iezzoni, Field Intelligence Director, Proofpoint
Roie Cohen Duwek, Director of Security Research, Proofpoint
Information Protection
Best Practices: Building an Information Protection Program
Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.
Speakers:
Justin Collins, Senior Director of Professional Services, Proofpoint
Matt Lyle, Professional Services Architect, Proofpoint
Best Practices: Detecting, Notifying, and Alerting on Account Compromise
Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.
Speakers:
Justin Collins, Senior Director of Professional Services, Proofpoint
Jessica Greer, Director of Professional Services, Proofpoint
Best Practices: Office 365 Security with Proofpoint
As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.
Speakers:
Michael Beninda, Principal Consultant - Professional Services, Proofpoint
James Knight, Principal Consultant - Professional Services, Proofpoint
Deep Dive: The Future of People-Centric Information Protection
The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.
Speakers:
Tim Choi, VP, Product Marketing, Proofpoint
Alex Kremer, VP, Chief Architect, Proofpoint
Introducing the Next Generation of People-Centric Insider Threat Management Technology
Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.
Speaker:
Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint
Modern Approaches to Information Protection, Privacy and Cloud Security
DLP and CASB are two of the most frustrating technologies on the market, yet every organization needs to implement cloud security and protect their data. Join us for this interactive session to learn about more modern approaches to these challenges.
Speakers:
Lucia Milica, Global Resident CISO, Proofpoint
Mike Stacy, Sr. Director of Advanced Technologies, Proofpoint
Protecting Your Cloud Data with Proofpoint CASB
With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.
Speakers:
Brian Tschinkel, CISO, Higher Education
Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
Itir Clarke, Sr. Product Marketing Manager, Proofpoint
The New Blue Print: The Future of People-Centric Information Protection
A people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy for Enterprise DLP and Insider Threat Management. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era.
Speakers:
David Knight, EVP and GM of Cloud Security Group, Proofpoint
Mayank Choudhary, SVP of Product, Insider Threat Management, Proofpoint
Panel discussion: The Evolution of the Insider Threat
Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutions related to insider threat management.
Speakers:
Stacey Champagne, Insider Threat Investigations Lead, PayPal
Gary Hayslip, CISO, Softbank Investment Advisors
Rob Oden, Cybersecurity Architect, L3 Harris
Mike McKee, EVP and GM for Insider Threat Management, Proofpoint
Practitioner Strategies for the Work From Home Enterprise
The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint customers sharing their stories and strategies related to their experience adapting to the new normal of work from home.
Speakers:
Matt Lyle, Professional Services Architect, Proofpoint
Mike Olden, Principal Consultant, Proofpoint
Technology Strategies to Better Secure the All-Remote Enterprise
The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.
Speakers:
Lucia Milica, Global Resident CISO, Proofpoint
J.C. Checco, Resident CISO, Proofpoint
Modern Compliance
2020 In Review: Learnings for Compliance Leaders
The global pandemic has forced people across demographics to make drastic lifestyle changes overnight. Similarly, businesses and organizations have had to adapt and align policies to the ""new normal"" brought on by travel restrictions and mostly remote workforces. Join us for an informative breakout where our customer panel will share what they've learned during the turbulent first half of 2020.
We'll ask them:
- How shelter-in-place orders and other restrictions impacted their compliance teams
- What parts of their processes and programs have they had to change
- What long-term changes they anticipate making in response to their learnings
Speakers:
Suzanne La Roque, Compliance IT Transformation Strategy Director, Pacific Life
Melanie Taylor, SVP Compliance, LPL Financial
Amanda Anderson, Product Marketing Manager, Proofpoint
Augmenting Microsoft 365 Solutions with Proofpoint Capture & Archiving
No single vendor can be everything to everyone. Not Microsoft. Not even Proofpoint. And when it comes to archiving and compliance initiatives, there are compelling reasons to augment Office 365 (now Microsoft 365) with Proofpoint Enterprise Archive and Proofpoint Content Capture. Attend this session to learn some of the significant ways Proofpoint can help your organization when it comes to capturing a wide array of content for compliance initiatives and storing it long-term to meet your business and regulatory information retention requirements.
Join us for insights on:
- The best methods for capturing Microsoft email and Teams communications
- How much easier to use Proofpoint e-discovery technology is than the Microsoft features you’ve implemented or are considering
- How to mitigate communications risks for regulatory and internal compliance purposes with Enterprise Archive and Proofpoint Intelligent Supervision
Speakers:
Shawn Aquino, Senior Product Marketing Manager, Proofpoint
Terry McMahon, Senior Systems Engineer, Proofpoint
Best Practices for Balancing Risk and Reward with Social Media and Digital Communications
New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.
In this session, you'll learn:
- Important considerations for how you capture and manage communications data
- How to scale supervision of public-facing channels
- How to avoid common pitfalls and roadblocks
Speakers:
Natasha Richards, VP Professional Services, Grapevine6
Amanda Anderson, Product Marketing Manager, Proofpoint
Best Practices for Balancing Risk and Reward with Social Media and Digital Communications - EMEA
New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.
In this session, you'll learn:
- Important considerations for how you capture and manage communications data
- How to scale supervision of public-facing channels
- How to avoid common pitfalls and roadblocks
Speakers:
Ian Healey, Partner Marketing Manager, EMEA, Hootsuite
Michael McGrath, Sr. Director Compliance & Digital Risk, Proofpoint
People-Centric Compliance for your Digital Transformation Journey
Proofpoint Compliance's vision for the next 1 - 3 years; covering market trends, challenges, and help guide customers on where best to place their compliance investments within an end-to-end technology stack that is or will be going through digital transformation.
Speaker:
Darren Lee, EVP & GM of Compliance and Archiving, Proofpoint
Simplify Your Legacy Data Migration Strategy with Ease
As data migration size increases from Terabytes to Petabytes, imports include more than just messages, coupled with speed expectations and compliance needs has required PFPT to innovate and automate. This session will go into how we have adapted to this need and what we have done.
Speakers:
Thalli Badrinath, Senior Director of Professional Services, Proofpoint
Mark DiGiovanni, Senior Director of Professional Services, Proofpoint
Tech Session: How to Mitigate Compliance Risk with Intelligent Supervision
Businesses are becoming aware of the need to monitor employee communications and mitigate risk associated with electronic communications. Once the domain for primarily financial services organizations, supervision technology now extends to many other vertical markets and industries. Discover the latest approach to protect your organization from legal, regulatory, and reputational risk.
Join us to learn insights on:
- What does a Compliance Risk Mitigation program look like and why is it critical for your organization, including trends driving adoption
- How Proofpoint can help you implement your Compliance Risk Mitigation program
- What best practices can be shared through learnings from customers who’ve started their journey
Speakers:
Rick Dales, VP, Product Management, Proofpoint
John Pepe, Market Development Principal of Financial Services, Proofpoint
Tech Session: Proofpoint E-Discovery - Everything You Need for Investigations
Proofpoint Enterprise Archive already has plenty of great e-discovery features to help you search your data in seconds, preserve what you need to, and export data as needed for outside review. But we've added a whole host of new features to refine what you're searching for. In this session, Proofpoint experts will focus on how to leverage these new features and highlight how to better use some of the existing tools.
Join us to learn:
- How Proofpoint delivers on its industry-leading SLA through blazing fast search performance, coupled with flexible filtering and options for managing results
- How ease-of-use is built into our e-discovery workflow, empowering non-technical users for self-service through a unified user experience from basic through advanced capabilities
- How advanced features enable you to perform more analysis, processing and culling in house, helping reduce related costs
Speakers:
Dave Ely, Director of Product Management, Proofpoint
Davin Stilson, Manager of Sales Engineering, Proofpoint
Why Intelligence Matters when Addressing Your Pressing E-Discovery and Supervision Challenges
An "intelligent solution can certainly leverage machine learning or artificial intelligence. At Proofpoint, however, we see intelligence" as a trifecta that spans Detection, Automation, and Visualization in features that help improve efficiency, reduce costs and more. In this session, we’ll peer into specific ways Proofpoint has woven intelligent innovations into its archiving technology to solve real customer challenges.
Join us for insights on:
- Using Intelligent Supervision and features such as Compliance Risk Dashboard and Review Sets to detect inappropriate behavior
- Using automation through Technology Assisted Review in-house to help reduce costs and improve accuracy
- Using advanced e-discovery features for enhanced visualization to better understand the nature of the data you have
Speakers:
Shawn Aquino, Senior Product Marketing Manager, Proofpoint
Terry McMahon, Senior Systems Engineer, Proofpoint
Security Awareness Training
Building a Successful Security Awareness Month Campaign
Do you find yourself scrambling to put together a plan for Cyber Security Awareness Month in October? We will walk you through a new offering, Campaigns, where we outline timelines, engagement ideas, internal communication resources and content to help you deliver a successful program.
Speakers:
Susan Mackowiak, Sr. Director of Program Content, Proofpoint
Gretel Egan, Sr. Security Awareness and Training Strategist of CSAP, Proofpoint
Customer Story: Graduating Good Cyber Citizens
Saint Louis University started with Proofpoint's technology to reduce IT overhead and exposure to phishing attacks. Learn from their CISO Rebecca Harness how they're educating and empowering their diverse groups of users to be a strong line of defense using Proofpoint Security Awareness Training.
Speakers:
Rebecca Harness, CISO, St. Louis University
Mark Guntrip, Director of Product Marketing, Proofpoint
How integrating threat intelligence translates into a superior security awareness program
Proofpoint threat intelligence, as well as offering valuable insight into how attackers are targeting people can add significant value to a security awareness program. Learn how Proofpoint obtains visibility and translates it into value for your program.
Speaker:
Mark Guntrip, Director, Product Marketing, Proofpoint
Implementing a people-centric, data driven security awareness programme
We cannot secure behaviour so we need our employees to behave securely. For a long time awareness campaigns have been focused on sending the same message at the same time to all employees. But people are different — they are targeted differently, behave differently, are incentivised and triggered by different things. Companies can no longer rely on surveys and e-learnings alone to change behaviour. We need to tailor our awareness efforts for each employee. In this session we will walk through how by giving each employee the right training at the right time, ABN AMRO makes the organisation more cyber resilient.
Speakers:
Richard Verbrugge, Information Security Awareness Manager, ABN Amro
Paul Down, Senior Director, Security Awareness Training, EMEA, Proofpoint
Security Awareness Training: One CISO’s Journey from "Doubter to Believer”
Hear from a former Fortune 500 CISO, Alan Levine about how he didn’t believe in security awareness training — until a nation-state attack on his organization revealed the value of including users in a defense-in-depth strategy.
Speakers:
Alan Levine, CISO Advisor
Roie Cohen Duwek, Director of Security Research, Proofpoint
CISO / Leadership
An Overdue Shift to People-Centric Security
The forces of digital transformation are reshaping work and cyber trends at light speed. This session will explain why the shift to people-centric security is relevant, urgent, and long overdue. We will introduce a new framework with practical guidance for CISOs to implement and evolve their strategy.
Speakers:
Lucia Milica, Global Resident CISO, Proofpoint
Sherrod DeGrippo, Senior Director of Threat Research and Detection, Proofpoint
BEC Attacks in Academia – Who’s Impersonating Whom?
The 2020 Verizon DBIR cited BEC as one of the most problematic attack types in academia. This session features a presentation and panel discussion that outlines who cybercriminals are targeting in teaching institutions, the most impactful lures being deployed, and tactics to thwart the bad actors.
Speakers:
Michael Duff, AVP & CISO, Stanford University
Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint
Introducing Nexus People Risk Explorer
Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.
Speakers:
Julie Sutton, Information Security Manager, City and County of Denver
Chris White, CISO, IPG
Jenn Cheng, Director, Product Marketing, Proofpoint
Mitigating Risk in a Distributed Workforce
While it would have been nice if threat actors had taken a break during the initial COVID lockdowns, what we actually saw was a significant increase in cyber attacks -- particularly social engineering attacks, such as phishing. As this 'new normal' continues to evolve, businesses need a way to mitigate these attacks and protect their increasingly distributed workforce.
In this session, we'll talk through the role of risk-based authentication in modern, zero trust security as well as how integrations across security technologies, such as with Proofpoint, Okta + CrowdStrike, can enhance security and also productivity -- wherever your workers are, and whatever tools they're using.
Speaker:
Kelsey Nelson, Senior Product Marketing Manager, Okta
People-Centric Security from a Government Perspective
Government organizations have unique drivers and compliance requirements. This session will focus on how a people-centric approach can help government organizations make more progress against protecting systems, networks, and people from those who wish to do them harm.
Speakers:
Dean Johnson, COO, Georgia Technology Authority
Mike Baker, CISO, GDIT
Bruce Brody, Resident CISO, Proofpoint
Predictions Beyond 2020 for Financial Services: “What a Long Strange Trip It’s Been” (Grateful Dead)
Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.
Attend this session to learn about:
- The ransomware cyber threat landscape
- Using strategic, operational and tactical assessments to shine lights on points of exposure
- How technical knowledge, intel, threat hunting and partners can help pave the way forward
- Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint
Speakers:
J.C. Checco, Resident CISO, Proofpoint
Sean O'Dowd, Global Financial Services Director, Proofpoint
Protecting Healthcare From Cyberattacks During a Pandemic and Beyond
This past year, Proofpoint researchers noted a surge in attacks with health-related topics, specifically COVID-19, as the lure of choice.
Join our speakers as they share:
- Rapid evolution of healthcare-themed phishing
- Research on the most attacked healthcare job functions
- Controls and strategies to protect your people and patients
Speakers:
Jason Powell, CISO, Brookdale Senior Living
Frank Wazsmer, CISO, Prisma Health
Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint
Protecting Your Health System from BEC Attacks
Cybercriminals today are targeting health systems using fraudulent emails to clinical staff, administrators, and business associates within the supply chain. In this panel, we’ll hear more about these frighteningly effective attacks and learn how to empower your people to know a legitimate request from a con.
Speakers:
Justin Stover, CISO, Select Medical
Chris Baldwin, CISO, Hartford Health
Ryan Witt, Managing Director, Healthcare and Education, Proofpoint
Speaking Your CFO's Language
Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.
Speakers:
Paul Auvil, Chief Financial Officer, Proofpoint
Lucia Milica, Global Resident CISO, Proofpoint
Strategies for Engaging with Your Board of Directors
Today’s CISOs must answer to the business and the board. Benchmarks, maturity models, and frameworks help facilitate those conversations. This session will share such strategies, tools, and data to help you build your next presentation and guarantee the attention of your company board.
Speakers:
Lucia Milica, Global Resident CISO, Proofpoint
Andrew Rose, Resident CISO - EMEA, Proofpoint
Technology Strategies to Better Secure the All-Remote Enterprise
The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.
Speakers:
Lucia Milica, Global Resident CISO, Proofpoint
J.C. Checco, Resident CISO, Proofpoint
Threat Intelligence Observations for 2020 and Beyond
Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.
Attend this session to learn about:
- The ransomware cyber threat landscape
- Using strategic, operational and tactical assessments to shine lights on points of exposure
- How technical knowledge, intel, threat hunting and partners can help pave the way forward
- Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint
Speaker:
Josh Burgess, Lead Technical Strategic Advisor, CrowdStrike
Email Security
A Blueprint to Defend Against Business Email Compromise (BEC) and Email Account Compromise (EAC)
BEC and EAC have cost organizations $26B over a three-year-period. How can your organization best protect itself against these costly threats? Join this Proofpoint customer session to hear about strategies, best practices and lessons learned to defend against BEC and EAC.
Speakers:
- Brian Uhreen, Manager Security Operations, Finning International
- Sara Pan, Senior Product Marketing Manager, Proofpoint
Best Practices: Implementing DMARC for Inbound Email
Many organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security.
Speakers:
- Rob Fleming, Principal Consultant, Proofpoint
- Christophe Wolfhugel, Principal Consultant, Proofpoint
Best Practices: Office 365 with Proofpoint
As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.
Speakers:
- Michael Beninda, Director of Professional Services, Proofpoint
- James Knight, Principal Consultant, Proofpoint
Best Practices: Preventing Business Email Compromise and Email Account Compromise
Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC.
Speakers:
- Jessica Greer, Director of Professional Services, Proofpoint
- Mike Olden, Principal Consultant, Proofpoint
Leverage VAPs as a Blueprint to Apply Adaptive Controls
In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks.
Speaker:
- Brett Shaw, Sr. Product Marketing Manager, Proofpoint
- Neko Papez, Product Marketing Manager, Proofpoint
- Gary Hayslip, CISO, Softbank Investment Advisors
Reducing Phishing Attacks and Operational Costs through Automation
With email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.
Speakers:
- Grover Newborn, Sr. Security Engineer, CoStar
- Tanner Luxner, Product Marketing Manager, Proofpoint
Stopping Identity Deception with DMARC
Identity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC.
Speakers:
- Jason Carter, IT Manager, Florida State University
- Tanner Luxner, Product Marketing Manager, Proofpoint
Threat Actors' New Blueprint: Combining Email and Cloud Threats
The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.
Speakers:
- Chris Iezzoni, Field Intelligence Director, Proofpoint
- Roie Cohen Duwek, Director of Security Research, Proofpoint
Cloud Security
Best Practices: Detecting, Notifying, and Alerting on Account Compromise
Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.
Speakers:
- Justin Collins, Senior Director of Professional Services, Proofpoint
- Jessica Greer, Director of Professional Services, Proofpoint
Best Practices: Governing third-party OAuth apps and scripts
If you are looking for a framework to governing third-party OAuth apps and reducing your attack surface, look no further than Proofpoint CASB. In this workshop, you will learn how to defend against malicious apps, evaluate new authorizations and existing apps for risk and define app governance policies.
Speakers:
- Izak Karmona, Principal Consultant, Proofpoint
- Nikos Nikolaou, Director of Professional Services, Proofpoint
Best Practices: Office 365 Security with Proofpoint
As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.
Speakers:
- Michael Beninda, Principal Consultant - Professional Services, Proofpoint
- James Knight, Principal Consultant - Professional Services, Proofpoint
Deploying Zero Trust with Proofpoint
Zero trust is a term that is being used broadly, but what does it really mean? And what does it take for an organization to adopt a zero trust architecture? For many, starting the deployment of zero trust technology can be quick - see how Proofpoint can start you on your journey.
Speakers:
- Yacov (Jack) Kotev, Security Engineer, Outbrain
- Kobi Seviliya, Director of Global IT, Outbrain
- Chen Nisnkorn,Sr. Director, Technical Sales, Proofpoint
- Eric Schwake, Sr. Manager, Product Marketing, Proofpoint
Leverage VAPs and Cloud Insights as a Blueprint to Apply Adaptive Controls
In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) Intelligence and cloud threat insights as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how to deploy solutions for better protection against future attacks.
Speakers:
- Gary Haysli, CISO, Softbank Investment Advisors
- Brett Shaw, Sr. Product Marketing Manager, Proofpoint
- Neko Papez, Product Marketing Manager, Proofpoint
Protecting Your Cloud Data with Proofpoint CASB
With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.
Speakers:
- Brian Tschinkel, CISO, Higher Education
- Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
- Itir Clarke, Sr. Product Marketing Manager, Proofpoint
Technology Strategies to Better Secure the All-Remote Enterprise
The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.
Speakers:
- Lucia Milica, Resident CISO, Proofpoint
- John Checco, Resident CISO, Proofpoint
Threat Actors' New Blueprint: Combining Email and Cloud Threats
The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.
Speakers:
- Chris Iezzoni, Field Intelligence Director, Proofpoint
- Roie Cohen Duwek, Director of Security Research, Proofpoint
Information Protection
Best Practices: Building an Information Protection Program
Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.
Speakers:
- Justin Collins, Senior Director of Professional Services, Proofpoint
- Matt Lyle, Professional Services Architect, Proofpoint
Best Practices: Detecting, Notifying, and Alerting on Account Compromise
Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.
Speakers:
- Justin Collins, Senior Director of Professional Services, Proofpoint
- Jessica Greer, Director of Professional Services, Proofpoint
Best Practices: Office 365 Security with Proofpoint
As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.
Speakers:
- Michael Beninda, Principal Consultant - Professional Services, Proofpoint
- James Knight, Principal Consultant - Professional Services, Proofpoint
Deep Dive: The Future of People-Centric Information Protection
The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.
Speakers:
- Tim Choi, VP, Product Marketing, Proofpoint
- Alex Kremer, VP, Chief Architect, Proofpoint
Modern Approaches to Information Protection, Privacy and Cloud Security
DLP and CASB are two of the most frustrating technologies on the market, yet every organization needs to implement cloud security and protect their data. Join us for this interactive session to learn about more modern approaches to these challenges.
Speakers:
- Lucia Milica, Global Resident CISO, Proofpoint
- Mike Stacy, Sr. Director of Advanced Technologies, Proofpoint
Introducing the Next Generation of People-Centric Insider Threat Management Technology
Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.
Speaker:
- Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint
Panel discussion: The Evolution of the Insider Threat
Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutions related to insider threat management.
Speakers:
- Stacey Champagne, Insider Threat Investigations Lead, PayPal
- Gary Hayslip, CISO, Softbank Investment Advisors
- Rob Oden, Cybersecurity Architect, L3 Harris
- Mike McKee, EVP and GM for Insider Threat Management, Proofpoint
Practitioner Strategies for the Work From Home Enterprise
The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint customers sharing their stories and strategies related to their experience adapting to the new normal of work from home.
Speakers:
- Matt Lyle, Professional Services Architect, Proofpoint
- Mike Olden, Principal Consultant, Proofpoint
Protecting Your Cloud Data with Proofpoint CASB
With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.
Speakers:
- Brian Tschinkel, CISO, Higher Education
- Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
- Itir Clarke, Sr. Product Marketing Manager, Proofpoint
Technology Strategies to Better Secure the All-Remote Enterprise
The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.
Speakers:
- Lucia Milica, Global Resident CISO, Proofpoint
- J.C. Checco, Resident CISO, Proofpoint
The New Blue Print: The Future of People-Centric Information Protection
A people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy for Enterprise DLP and Insider Threat Management. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era.
Speakers:
- David Knight, EVP and GM of Cloud Security Group, Proofpoint
- Mayank Choudhary, SVP of Product, Insider Threat Management, Proofpoint
Modern Compliance
2020 In Review: Learnings for Compliance Leaders
The global pandemic has forced people across demographics to make drastic lifestyle changes overnight. Similarly, businesses and organizations have had to adapt and align policies to the ""new normal"" brought on by travel restrictions and mostly remote workforces. Join us for an informative breakout where our customer panel will share what they've learned during the turbulent first half of 2020.
We'll ask them:
- How shelter-in-place orders and other restrictions impacted their compliance teams
- What parts of their processes and programs have they had to change
- What long-term changes they anticipate making in response to their learnings
Speakers:
- Suzanne La Roque, Compliance IT Transformation Strategy Director, Pacific Life
- Melanie Taylor, SVP Compliance, LPL Financial
- Amanda Anderson, Product Marketing Manager, Proofpoint
Augmenting Microsoft 365 Solutions with Proofpoint Capture & Archiving
No single vendor can be everything to everyone. Not Microsoft. Not even Proofpoint. And when it comes to archiving and compliance initiatives, there are compelling reasons to augment Office 365 (now Microsoft 365) with Proofpoint Enterprise Archive and Proofpoint Content Capture. Attend this session to learn some of the significant ways Proofpoint can help your organization when it comes to capturing a wide array of content for compliance initiatives and storing it long-term to meet your business and regulatory information retention requirements.
Join us for insights on:
- The best methods for capturing Microsoft email and Teams communications
- How much easier to use Proofpoint e-discovery technology is than the Microsoft features you’ve implemented or are considering
- How to mitigate communications risks for regulatory and internal compliance purposes with Enterprise Archive and Proofpoint Intelligent Supervision
Speakers:
- Shawn Aquino, Senior Product Marketing Manager, Proofpoint
- Terry McMahon, Senior Systems Engineer, Proofpoint
Best Practices for Balancing Risk and Reward with Social Media and Digital Communications
New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.
In this session, you'll learn:
- Important considerations for how you capture and manage communications data
- How to scale supervision of public-facing channels
- How to avoid common pitfalls and roadblocks
Speakers:
- Natasha Richards, VP Professional Services, Grapevine6
- Amanda Anderson, Product Marketing Manager, Proofpoint
Best Practices for Balancing Risk and Reward with Social Media and Digital Communications — EMEA
New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.
In this session, you'll learn:
- Important considerations for how you capture and manage communications data
- How to scale supervision of public-facing channels
- How to avoid common pitfalls and roadblocks
Speakers:
- Ian Healey, Partner Marketing Manager, EMEA, Hootsuite
- Michael McGrath, Sr. Director Compliance & Digital Risk, Proofpoint
People-Centric Compliance for your Digital Transformation Journey
Proofpoint Compliance's vision for the next 1 - 3 years; covering market trends, challenges, and help guide customers on where best to place their compliance investments within an end-to-end technology stack that is or will be going through digital transformation.
Speaker:
- Darren Lee, EVP & GM of Compliance and Archiving, Proofpoint
Simplify Your Legacy Data Migration Strategy with Ease
As data migration size increases from Terabytes to Petabytes, imports include more than just messages, coupled with speed expectations and compliance needs has required PFPT to innovate and automate. This session will go into how we have adapted to this need and what we have done.
Speakers:
- Thalli Badrinath, Senior Director of Professional Services, Proofpoint
- Mark DiGiovanni, Senior Director of Professional Services, Proofpoint
Tech Session: How to Mitigate Compliance Risk with Intelligent Supervision
Businesses are becoming aware of the need to monitor employee communications and mitigate risk associated with electronic communications. Once the domain for primarily financial services organizations, supervision technology now extends to many other vertical markets and industries. Discover the latest approach to protect your organization from legal, regulatory, and reputational risk.
Join us to learn insights on:
- What does a Compliance Risk Mitigation program look like and why is it critical for your organization, including trends driving adoption
- How Proofpoint can help you implement your Compliance Risk Mitigation program
- What best practices can be shared through learnings from customers who’ve started their journey
Speakers:
- Rick Dales, VP, Product Management, Proofpoint
- John Pepe, Market Development Principal of Financial Services, Proofpoint
Tech Session: Proofpoint E-Discovery - Everything You Need for Investigations
Proofpoint Enterprise Archive already has plenty of great e-discovery features to help you search your data in seconds, preserve what you need to, and export data as needed for outside review. But we've added a whole host of new features to refine what you're searching for. In this session, Proofpoint experts will focus on how to leverage these new features and highlight how to better use some of the existing tools.
Join us to learn:
- How Proofpoint delivers on its industry-leading SLA through blazing fast search performance, coupled with flexible filtering and options for managing results
- How ease-of-use is built into our e-discovery workflow, empowering non-technical users for self-service through a unified user experience from basic through advanced capabilities
- How advanced features enable you to perform more analysis, processing and culling in house, helping reduce related costs
Speakers:
- Dave Ely, Director of Product Management, Proofpoint
- Davin Stilson, Manager of Sales Engineering, Proofpoint
Why Intelligence Matters when Addressing Your Pressing E-Discovery and Supervision Challenges
An "intelligent solution can certainly leverage machine learning or artificial intelligence. At Proofpoint, however, we see intelligence" as a trifecta that spans Detection, Automation, and Visualization in features that help improve efficiency, reduce costs and more. In this session, we’ll peer into specific ways Proofpoint has woven intelligent innovations into its archiving technology to solve real customer challenges.
Join us for insights on:
- Using Intelligent Supervision and features such as Compliance Risk Dashboard and Review Sets to detect inappropriate behavior
- Using automation through Technology Assisted Review in-house to help reduce costs and improve accuracy
- Using advanced e-discovery features for enhanced visualization to better understand the nature of the data you have
Speakers:
- Shawn Aquino, Senior Product Marketing Manager, Proofpoint
- Terry McMahon, Senior Systems Engineer, Proofpoint
Security Awareness Training
Building a Successful Security Awareness Month Campaign
Do you find yourself scrambling to put together a plan for Cyber Security Awareness Month in October? We will walk you through a new offering, Campaigns, where we outline timelines, engagement ideas, internal communication resources and content to help you deliver a successful program.
Speakers:
- Susan Mackowiak, Sr. Director of Program Content, Proofpoint
- Gretel Egan, Sr. Security Awareness and Training Strategist of CSAP, Proofpoint
Customer Story: Graduating Good Cyber Citizens
Saint Louis University started with Proofpoint's technology to reduce IT overhead and exposure to phishing attacks. Learn from their CISO Rebecca Harness how they're educating and empowering their diverse groups of users to be a strong line of defense using Proofpoint Security Awareness Training.
Speakers:
- Rebecca Harness, CISO, St. Louis University
- Mark Guntrip, Director of Product Marketing, Proofpoint
How integrating threat intelligence translates into a superior security awareness program
Proofpoint threat intelligence, as well as offering valuable insight into how attackers are targeting people can add significant value to a security awareness program. Learn how Proofpoint obtains visibility and translates it into value for your program.
Speaker:
- Mark Guntrip, Director, Product Marketing, Proofpoint
Implementing a people-centric, data driven security awareness programme
We cannot secure behaviour so we need our employees to behave securely. For a long time awareness campaigns have been focused on sending the same message at the same time to all employees. But people are different — they are targeted differently, behave differently, are incentivised and triggered by different things. Companies can no longer rely on surveys and e-learnings alone to change behaviour. We need to tailor our awareness efforts for each employee. In this session we will walk through how by giving each employee the right training at the right time, ABN AMRO makes the organisation more cyber resilient.
Speakers:
- Richard Verbrugge, Information Security Awareness Manager, ABN Amro
- Paul Down, Senior Director, Security Awareness Training, EMEA, Proofpoint
Security Awareness Training: One CISO’s Journey from "Doubter to Believer”
Hear from a former Fortune 500 CISO, Alan Levine about how he didn’t believe in security awareness training — until a nation-state attack on his organization revealed the value of including users in a defense-in-depth strategy.
Speakers:
- Alan Levine, CISO Advisor
- Roie Cohen Duwek, Director of Security Research, Proofpoint
CISO / Leadership
An Overdue Shift to People-Centric Security
The forces of digital transformation are reshaping work and cyber trends at light speed. This session will explain why the shift to people-centric security is relevant, urgent, and long overdue. We will introduce a new framework with practical guidance for CISOs to implement and evolve their strategy.
Speakers:
- Lucia Milica, Global Resident CISO, Proofpoint
- Sherrod DeGrippo, Senior Director of Threat Research and Detection, Proofpoint
BEC Attacks in Academia – Who’s Impersonating Whom?
The 2020 Verizon DBIR cited BEC as one of the most problematic attack types in academia. This session features a presentation and panel discussion that outlines who cybercriminals are targeting in teaching institutions, the most impactful lures being deployed, and tactics to thwart the bad actors.
Speakers:
- Michael Duff, AVP & CISO, Stanford University
- Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint
Introducing Nexus People Risk Explorer
Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.
Speakers:
- Julie Sutton, Information Security Manager, City and County of Denver
- Chris White, CISO, IPG
- Jenn Cheng, Director, Product Marketing, Proofpoint
Mitigating Risk in a Distributed Workforce
While it would have been nice if threat actors had taken a break during the initial COVID lockdowns, what we actually saw was a significant increase in cyber attacks -- particularly social engineering attacks, such as phishing. As this 'new normal' continues to evolve, businesses need a way to mitigate these attacks and protect their increasingly distributed workforce.
In this session, we'll talk through the role of risk-based authentication in modern, zero trust security as well as how integrations across security technologies, such as with Proofpoint, Okta + CrowdStrike, can enhance security and also productivity -- wherever your workers are, and whatever tools they're using.
Speaker:
- Kelsey Nelson, Senior Product Marketing Manager, Okta
People-Centric Security from a Government Perspective
Government organizations have unique drivers and compliance requirements. This session will focus on how a people-centric approach can help government organizations make more progress against protecting systems, networks, and people from those who wish to do them harm.
Speakers:
- Dean Johnson, COO, Georgia Technology Authority
- Mike Baker, CISO, GDIT
- Bruce Brody, Resident CISO, Proofpoint
Predictions Beyond 2020 for Financial Services: “What a Long Strange Trip It’s Been” (Grateful Dead)
Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.
Attend this session to learn about:
- The ransomware cyber threat landscape
- Using strategic, operational and tactical assessments to shine lights on points of exposure
- How technical knowledge, intel, threat hunting and partners can help pave the way forward
- Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint
Speakers:
- J.C. Checco, Resident CISO, Proofpoint
- Sean O'Dowd, Global Financial Services Director, Proofpoint
Protecting Healthcare From Cyberattacks During a Pandemic and Beyond
This past year, Proofpoint researchers noted a surge in attacks with health-related topics, specifically COVID-19, as the lure of choice.
Join our speakers as they share:
- Rapid evolution of healthcare-themed phishing
- Research on the most attacked healthcare job functions
- Controls and strategies to protect your people and patients
Speakers:
- Jason Powell, CISO, Brookdale Senior Living
- Frank Wazsmer, CISO, Prisma Health
- Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint
Protecting Your Health System from BEC Attacks
Cybercriminals today are targeting health systems using fraudulent emails to clinical staff, administrators, and business associates within the supply chain. In this panel, we’ll hear more about these frighteningly effective attacks and learn how to empower your people to know a legitimate request from a con.
Speakers:
- Justin Stover, CISO, Select Medical
- Chris Baldwin, CISO, Hartford Health
- Ryan Witt, Managing Director, Healthcare and Education, Proofpoint
Speaking Your CFO's Language
Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.
Speakers:
- Paul Auvil, Chief Financial Officer, Proofpoint
- Lucia Milica, Global Resident CISO, Proofpoint
Strategies for Engaging with Your Board of Directors
Today’s CISOs must answer to the business and the board. Benchmarks, maturity models, and frameworks help facilitate those conversations. This session will share such strategies, tools, and data to help you build your next presentation and guarantee the attention of your company board.
Speakers:
- Lucia Milica, Global Resident CISO, Proofpoint
- Andrew Rose, Resident CISO - EMEA, Proofpoint
Technology Strategies to Better Secure the All-Remote Enterprise
The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.
Speakers:
- Lucia Milica, Global Resident CISO, Proofpoint
- J.C. Checco, Resident CISO, Proofpoint
Threat Intelligence Observations for 2020 and Beyond
Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.
Attend this session to learn about:
- The ransomware cyber threat landscape
- Using strategic, operational and tactical assessments to shine lights on points of exposure
- How technical knowledge, intel, threat hunting and partners can help pave the way forward
- Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint
Speaker:
- Josh Burgess, Lead Technical Strategic Advisor, CrowdStrike