Wisdom 2020

September 2-3, 2020
Proofpoint Security Awareness

Learn More

Protect EMEA

September 15-16, 2020

Learn More

Frequently Asked Questions

Get all the answers here.

Learn More

See our blueprint for security and compliance to design your own framework for success

The strongest organizations have a well-designed blueprint for cybersecurity and compliance. Proofpoint has a comprehensive strategy to share with you—along with the solutions and threat intelligence to back it up. Join us at Protect 2020, online, and we’ll roll up our sleeves and lay it all out in front of you.

Reasons to attend Protect 2020:

  • Hear compelling keynotes from Proofpoint execs and industry experts
  • Discover how top cybersecurity and compliance professionals are protecting their organizations and people with Proofpoint products
  • Learn about new Proofpoint products that will accelerate your journey to people-centric security and compliance
  • Learn how to access and apply data to fortify your security and compliance posture
  • Explore topics designed to help CISO leadership elevate their game in people-centric security and compliance

Thank you for your submission.

Featured Speakers

Gary Steele,

Chief Executive Officer, Proofpoint

Ryan Kalember,

EVP, Cybersecurity Strategy, Proofpoint

David Knight,

EVP and GM, Security Products, Proofpoint

Sherrod DeGrippo,

Sr. Director, Threat Research and Detection, Proofpoint

Lucia Milică,

Resident CISO, Proofpoint

Patrick Gray,

Risky.Biz

Tracks

Real strategies. Actionable insights. Plan your experience at Protect 2020.

Cloud Security

Our Cloud Security track delivers real-world insight, best practices and frameworks to design and build an effective cloud security architecture. Learn how Proofpoint technology can help ease the transition to cloud services—zero-trust secure. Participants will:

  • Hear the real-world experiences of peers making the transition to the cloud
  • Preview the future direction of Proofpoint cloud security technologies
  • Learn how email and cloud threats are blended together by attackers to target your people
  • Learn how to secure cloud applications and data, as well as scale access for remote workers
  • See how the zero-trust model can propel your organization to cloud security

Email Security

In our Email Security track, you’ll meet with Proofpoint customers, researchers and product leaders to explore the evolving threat landscape and best practices to defend against email threats. You’ll get the information you need to build your blueprint to protect against the No.1 threat vector, including:

  • An overview of the evolving threat landscape with Proofpoint threat research
  • Customer-led discussions featuring strategies and best practices for email security
  • A preview of Proofpoint email security product strategy, innovations and road map
  • Learn how insights into cloud threats will augment your security posture in email protection
  • Practitioner sessions covering practical implementation of email security controls

Information Protection

In the post-perimeter, work-from-home world, a detailed plan for information protection is essential. In this track, you’ll learn how to prevent data loss across email, cloud and endpoint. You’ll also learn about managing incident response and preventing insider-led security breaches, and more. Sessions include:

  • An overview of the Proofpoint people-centric information protection vision and strategy 
  • Practitioner discussions covering practical implementation of modern information protection strategies
  • Guided tours of new innovation within the Proofpoint information protection platform 
  • Panels featuring customers and experts discussing strategies and best practices

Modern Compliance

Do you have a blueprint for success in compliance? This track gives you one—exploring the latest in regulatory trends and compliance technologies. Join us for sessions highlighting the most impactful ways to stay ahead of digital paradigms as a regulated organization while adding value for your global enterprise. Here, you will discover:

  • A people-centric compliance vision and road map for use during digital transformation 
  • Best practices for social media and digital communications compliance
  • Value creation for organizations focusing on reducing compliance and regulatory risks
  • Insights from industry leaders who share real-world experiences in compliance

Security Awareness Training

Building a culture of security means designing superior training. This track explores how others extend technological controls with training, and details how our Very Attacked People™ (VAP) insights enable targeted training based on threats seen in the wild. You’ll also:

  • Learn how security awareness training can complement existing security technology
  • Understand how a security-focused culture can positively affect your security posture
  • See how Proofpoint threat intelligence can shape a security awareness program that is effective in affecting behavior change

CISO / Leadership

The architects of security strategies gather to share insights in this special CISO track. Alongside prominent thought leaders, you’ll take away a wealth of best practices and leadership advice on better ways to mitigate risk and justify technology spend. Topics include:

  • Collaborating with your CFO and presenting to the board
  • Introducing new tools and frameworks that define the people-centric blueprint
  • Exploring what’s next for cybersecurity in a post-pandemic economy
  • Sharing trends in financial services, healthcare, education and government

Agenda


 

Day 1

All events listed in PDT

8:30AM-8:45AM

Protect Pre-Game Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

8:45AM-9:15AM

Proofpoint Welcome Keynote with Gary Steele, CEO

Gary Steele, Chief Executive Officer, Proofpoint


Learn about the latest innovations we're delivering in people-centric security, as well as our continued commitments to delivering new insights that resonate from the SOC to the boardroom. Gary will also highlight our continued investments in our customers’ experience and the latest developments with our security ecosystem partners.

9:15AM-9:25AM

Protect Studio Updates

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

9:25AM-10:30AM

Risky Business Live

Ryan Kalember, Executive VP of Cybersecurity Strategy, Proofpoint

Sherrod DeGrippo, Sr. Director of Threat Research and Detection, Proofpoint

Patrick Gray, Risky.Biz


Join Patrick Gray, the host of the world’s most influential infosec podcast as he discusses the latest in the threat landscape with Proofpoint’s own Sherrod DeGrippo. Afterward, Patrick will tackle some of the thorniest issues in cybersecurity with an expert panel of leading CISOs and Proofpoint’s Ryan Kalember.

10:30AM-10:40AM

Protect Half-Time Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

10:40AM-11:10AM

James Veitch

Ryan Kalember, Executive VP of Cybersecurity Strategy, Proofpoint

James Veitch, Comedian and Writer

11:10AM-11:20AM

Protect Post-Game Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

11:20AM-2:30PM

Content Tracks

11:20AM-12:10PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director, Security Research, Proofpoint

CE Credits: 0.75


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

12:15PM-12:45PM

A Blueprint to Defend Against Business Email Compromise (BEC) and Email Account Compromise (EAC)

Sara Pan, Senior Product Marketing Manager, Proofpoint


BEC and EAC have cost organizations $26B over a three-year-period. How can your organization best protect itself against these costly threats? Join this Proofpoint customer session to hear about strategies, best practices and lessons learned to defend against BEC and EAC.

12:50PM-1:20PM

Improving Email Security with an Integrated, Multi-layered Blueprint

Cheryl Tang, Director of Product Marketing, Proofpoint


The modern threat landscape is increasingly complex. Email continues to be the number 1 threat vector. Many organizations use multiple security solutions to address this complex security problem. Join this Proofpoint customer session to learn how an integrated, multi-layered solution can improve your security posture and simplify your management overhead.

1:25PM-1:55PM

Stopping Identity Deception with DMARC

Tanner Luxner, Product Marketing Manager, Proofpoint


Identity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC.

2:00PM-2:30PM

Reducing Phishing Attacks and Operational Costs through Automation

Tanner Luxner, Product Marketing Manager, Proofpoint


With email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

11:20AM-12:10PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director, Security Research, Proofpoint

CE Credits: 0.75


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

12:15PM-12:45PM

Bypassing MFA for Cloud Apps

Or Safran, Sr. Threat Detection Analyst, Proofpoint


Recent Proofpoint and Cloud Security Alliance survey shows that only 38% of organizations use Multi-factor Authentication (MFA) to protect their cloud applications. While adoption of MFA for cloud apps is advisable, it is possible to bypass MFA using methods like real-time phishing or by taking advantage of vulnerabilities. Proofpoint will demo newest tactics in bypassing MFA for cloud applications.

12:50PM-1:20PM

Protecting Your Cloud Data with Proofpoint CASB

Itir Clarke, Sr. Product Marketing Manager, Proofpoint


With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

1:25PM-1:55PM

Deploying Zero Trust with Proofpoint

Chen Nisnkorn, Sr. Director, Technical Sales, Proofpoint


Zero trust is a term that is being used broadly, but what does it really mean? And what does it take for an organization to adopt a zero trust architecture? For many, starting the deployment of zero trust technology can be quick - see how Proofpoint can start you on your journey.

2:00PM-2:30PM

Strategies for Access Controls – CASB, Browser Isolation and ZTNA

Neko Papez, Product Marketing Manager, Proofpoint


Join this session to hear about how Proofpoint customers are addressing access through adaptive access controls in CASB, Browser Isolation, and Zero Trust Network Access (ZTNA). Hear about integrations with threat intelligence, granular policies, and multiple enforcement options.

11:20AM-12:10PM

The New Blue Print: The Future of People-Centric Information Protection

Ryan Kalember, EVP of Cybersecurity Strategy, Proofpoint

David Knight, EVP and GM of Cloud Security Group, Proofpoint


A people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy and investments. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era.

12:15PM-12:45PM

Deep Dive: The Future of People-Centric Information Protection

Tim Choi, VP of Product Marketing, Proofpoint

Alex Kremer, VP of Chief Architect, Proofpoint


Take a deep dive into the Information Protection platform. Tour the new innovations, and learn about key platform design principles to address privacy, anonymization, access controls, and more. If you have email DLP, CASB, or ITM, hear how you can get started today.

12:50PM-1:20PM

Coming Soon!

1:25PM-1:55PM

Introducing the Next Generation of People-Centric Insider Threat Management Technology

Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint


Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

2:00PM-2:30PM

Panel discussion: The Evolution of the Insider Threat

Mike McKee, EVP and GM for Insider Threat Management, Proofpoint


Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutions related to insider threat management.

11:20AM-12:10PM

People-Centric Compliance for your Digital Transformation Journey

Darren Lee, EVP & GM of Compliance and Archiving, Proofpoint


Proofpoint Compliance's vision for the next 1 - 3 years; covering market trends, challenges, and help guide customers on where best to place their compliance investments within an end-to-end technology stack that is or will be going through digital transformation

12:15PM-12:45PM

2020 In Review: Learnings for Compliance Leaders

Amanda Anderson, Product Marketing Manager, Proofpoint


The global pandemic has forced people across demographics to make drastic lifestyle changes overnight. Similarly, businesses and organizations have had to adapt and align policies to the ""new normal"" brought on by travel restrictions and mostly remote workforces. Join us for an informative breakout where our customer panel will share what they've learned during the turbulent first half of 2020.


We'll ask them:

• How shelter-in-place orders and other restrictions impacted their compliance teams

• What parts of their processes and programs have they had to change

• What long-term changes they anticipate making in response to their learnings

12:50PM-1:20PM

Best Practices for Balancing Risk and Reward with Social Media and Digital Communications

Amanda Anderson, Product Marketing Manager, Proofpoint


"New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.


In this session, you'll learn:

• Important considerations for how you capture and manage communications data

• How to scale supervision of public-facing channels

• How to avoid common pitfalls and roadblocks

1:25PM-1:55PM

Simplify Your Legacy Data Migration Strategy with Ease

Thalli Badrinath, Senior Director of Professional Services, Proofpoint

Mark DiGiovanni, Senior Manager of Professional Services, Proofpoint


As data migration size increases from Terabytes to Petabytes, imports include more than just messages, coupled with speed expectations and compliance needs has required PFPT to innovate and automate. This session will go into how we have adapted to this need and what we have done.

2:00PM-2:30PM

Augmenting Microsoft 365 Solutions with Proofpoint Capture & Archiving

Shawn Aquino, Senior Product Marketing Manager, Proofpoint

Terry McMahon, Senior Systems Engineer, Proofpoint


No single vendor can be everything to everyone. Not Microsoft. Not even Proofpoint. And when it comes to archiving and compliance initiatives, there are compelling reasons to augment Office 365 (now Microsoft 365) with Proofpoint Enterprise Archive and Proofpoint Content Capture. Attend this session to learn some of the significant ways Proofpoint can help your organization when it comes to capturing a wide array of content for compliance initiatives and storing it long-term to meet your business and regulatory information retention requirements. Join us for insights on:


• The best methods for capturing Microsoft email and Teams communications

• How much easier to use Proofpoint e-discovery technology is than the Microsoft features you’ve implemented or are considering

• How to mitigate communications risks for regulatory and internal compliance purposes with Enterprise Archive and Proofpoint Intelligent Supervision

12:15PM-12:45PM

Security Awareness Training: One CISO’s Journey from "Doubter to Believer”

Alan Levine, CISO Advisor


Hear from a former Fortune 500 CISO, Alan Levine about how he didn’t believe in security awareness training — until a nation-state attack on his organization revealed the value of including users in a defense-in-depth strategy.

12:50PM-1:20PM

Roadmap: Integrating Security Awareness Training into your security program


Understand how Proofpoint is using our people-centric strategy to offer the right training, to the right people, to get the right response. Integrations with Proofpoint email security solutions can offer an effective, streamlined way to give your end users customized training.

1:25PM-1:55PM

Customer Story: Building on a Solid Foundation

Mark Guntrip, Director of Product Marketing, Proofpoint


Efficacy is one of the keys to Proofpoint’s success. Though technical controls are essential to reduce people-centric risk, it’s important to build a culture of security awareness and empower users to be resilient against today’s attacks. Learn how companies have taken this important step.

2:00PM-2:30PM

Building a Successful Security Awareness Month Campaign

Susan Mackowiak, Sr. Director of Program Content, Proofpoint

Gretel Egan, Sr. Security Awareness and Training Strategist of CSAP, Proofpoint


Do you find yourself scrambling to put together a plan for Cyber Security Awareness Month in October? We will walk you through a new offering, Campaigns, where we outline timelines, engagement ideas, internal communication resources and content to help you deliver a successful program.

11:20AM-12:10PM

An Overdue Shift to People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Sherrod DeGrippo, Senior Director of Threat Research and Detection, Proofpoint


The forces of digital transformation are reshaping work and cyber trends at light speed. This session will explain why the shift to people-centric security is relevant, urgent, and long overdue. We will introduce a new framework with practical guidance for CISOs to implement and evolve their strategy.

12:15PM-12:45PM

Introducing Nexus Risk Dashboard


Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.

12:50PM-1:20PM

Strategies for Engaging with Your Board of Directors

Lucia Milica, Resident CISO, Proofpoint


Today’s CISOs must answer to the business and the board. Benchmarks, maturity models, and frameworks help facilitate those conversations. This session will share such strategies, tools, and data to help you build your next presentation and guarantee the attention of your company board.

1:25PM-1:55PM

Protecting Healthcare From Cyberattacks During a Pandemic and Beyond

Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint


This past year, Proofpoint researchers noted a surge in attacks with health-related topics, specifically COVID-19, as the lure of choice. Join our speakers as they share:


• Rapid evolution of healthcare-themed phishing

• Research on the most attacked healthcare job functions

• Controls and strategies to protect your people and patients

2:00PM-2:30PM

Coming Soon!

Day 2

All events listed in PDT

8:30AM-8:45AM

Protect Pre-Game Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

8:45AM-9:15AM

A cybersecurity keynote presentation unlike anything you’ve seen before

Ryan Kalember, Executive VP, Cybersecurity Strategy, Proofpoint

9:15AM-9:25AM

Protect Half-Time Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

9:25AM-9:55AM

The New Blueprint with Proofpoint Security and Compliance

David Knight, EVP and GM of Security Products, Proofpoint


Whether your challenge is business email compromise, cloud security, or securing newly remote workers, Proofpoint’s people-centric roadmap is delivering the innovations to keep your people protected. Join Proofpoint’s David Knight to hear about what we’ve delivered and what we’re building across our email security, cloud security, information protection, and security awareness training product lines. From new detection techniques to stop the latest attacker innovations to incredible new risk analytics, this session will help you look at your own security blueprint with new eyes.

9:55AM-10:15AM

Protect Post-Game Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint


Blake Salle, Chief Revenue Officer will provide the closing address to Protect conference and offer suggested next steps on how to take full advantage of your new blue print with Proofpoint as we all continue to protect your most valuable asset – your people.

10:20AM-3:20PM

Content Tracks

10:20AM-12:15PM

Email Security Roadmap

Rajneesh Chopra, Vice President of Product Management, Proofpoint

Tony Paterra, Vice President of Product Management, Proofpoint


Because attackers don't stop, we don't stop innovating and advancing our email security capabilities. Join this session as Proofpoint product experts unveil the blueprint for the future of Proofpoint Email Security. You'll hear about our long-term vision as well as soon to be available capabilities.

12:20PM-12:50PM

Leverage VAPs as a Blueprint to Apply Adaptive Controls

Brett Shaw, Sr. Product Marketing Manager, Proofpoint


In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks.

12:55PM-1:40PM

Best Practices: Office 365 with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

1:45PM-2:30PM

Best Practices: Preventing Business Email Compromise and Email Account Compromise

Jessica Greer, Director of Professional Services, Proofpoint

Mike Olden, Principal Consultant, Proofpoint


Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC.

2:35PM-3:20PM

Best Practices: Implementing DMARC for Inbound Email

Rob Fleming, Principal Consultant, Proofpoint

Christophe Wolfhugel, Principal Consultant, Proofpoint


Many organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security.

10:20AM-11:05AM

Technology Strategies to Better Secure the All-Remote Enterprise

Lucia Milica, Resident CISO, Proofpoint

John Checco, Resident CISO, Proofpoint


The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

11:10AM-12:15AM

Cloud Security Roadmap

Proofpoint Product Management Team


Learn how Proofpoint is innovating to enable organizations to make the shift to the cloud secure. Our cloud security roadmap incorporates CASB, zero trust, application security and isolation technologies to provide a solution that solves the business problems of transitioning security to the cloud.

12:20PM-12:50PM

Moving Network Security to the Cloud

Eric Schwake, Manager of Product Marketing, Proofpoint

Micha Rave, Senior Director of Product Management, Proofpoint


The network was the place that was protected above all else, the thing that connected all users, applications and data. But now that the Internet IS the network, how do we still implement security to the same level of effectiveness? Learn how Proofpoint is enabling organizations to shift their security stack to the cloud in an integrated scalable way.

12:55AM-1:40PM

Best Practices: Office 365 Security with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

1:45PM-2:30PM

Best Practices: Governing third-party OAuth apps and scripts

Izak Karmona, Principal Consultant, Proofpoint

Nikos Nikolaou, Director of Professional Services, Proofpoint


If you are looking for a framework to governing third-party OAuth apps and reducing your attack surface, look no further than Proofpoint CASB. In this workshop, you will learn how to defend against malicious apps, evaluate new authorizations and existing apps for risk and define app governance policies.

2:35PM-3:20PM

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Justin Collins, Senior Director of Professional Services, Proofpoint

Jessica Greer, Director of Professional Services, Proofpoint


Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

10:20AM-11:05AM

Technology Strategies to Better Secure the All-Remote Enterprise

Lucia Milica, Resident CISO, Proofpoint

John Checco, Resident CISO, Proofpoint


The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

11:10AM-11:40AM

Information Protection & Privacy

Lucia Milica, Resident CISO, Proofpoint

Mike Stacy, Sr. Director of Advanced Technologies, Proofpoint


Hear from our experts on what you should consider to successfully protect information while addressing privacy.

11:45AM-12:15PM

Practitioner Strategies for the Work From Home Enterprise

Matt Lyle, Professional Services Architect, Proofpoint

Mike Olden, Principal Consultant, Proofpoint


The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint customers sharing their stories and strategies related to their experience adapting to the new normal of work from home.

12:20PM-12:50PM

Best Practices: 5 Steps to Jumpstarting your ITM Program

Deborah Watson, Senior Security Advisor, Proofpoint


Building an Insider Threat Management program is a complicated endeavor. Practitioners should lean on proven frameworks to design programs for their organizations. Join the architect of Proofpoint's ITM Jumpstart Services for a discussion of the 5 steps for building a world class ITM program.

12:55PM-1:40PM

Best Practices: Office 365 Security with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

1:45PM-2:30PM

Best Practices: Building an Information Protection Program

Justin Collins, Senior Director of Professional Services, Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint


Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.

2:35PM-3:20PM

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Justin Collins, Senior Director of Professional Services, Proofpoint

Jessica Greer, Director of Professional Services, Proofpoint


Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

10:20AM-11:05AM

Why Intelligence Matters when Addressing Your Pressing E-Discovery and Supervision Challenges

Shawn Aquino, Senior Product Marketing Manager, Proofpoint

Terry McMahon, Senior Systems Engineer, Proofpoint


An intelligent solution can certainly leverage machine learning or artificial intelligence. At Proofpoint, however, we see "intelligence as a trifecta that spans Detection, Automation, and Visualization in features that help improve efficiency, reduce costs and more. In this session, we’ll peer into specific ways Proofpoint has woven intelligent innovations into its archiving technology to solve real customer challenges. Join us for insights on:


• Using Intelligent Supervision and features such as Compliance Risk Dashboard and Review Sets to detect inappropriate behavior

• Using automation through Technology Assisted Review in-house to help reduce costs and improve accuracy

• Using advanced e-discovery features for enhanced visualization to better understand the nature of the data you have

11:10AM-12:15PM

Roadmap: What's Next in the Evolution of Compliance and Recordkeeping Technology

Rick Dales, Vice President of Product Management, Proofpoint

Chris Tebo, VP of Engineering and Archiving CTO, Proofpoint


Proofpoint Product and Engineering come together to talk about how the digital communications landscape is evolving, what this means for compliance & information management teams, and how Proofpoint compliance products will evolve to support these changes.

12:20PM-12:50PM

Tech Session: Proofpoint E-Discovery - Everything You Need for Investigations

Dave Ely, Director of Product Management, Proofpoint

Davin Stilson, Manager of Sales Engineering, Proofpoint


Proofpoint Enterprise Archive already has plenty of great e-discovery features to help you search your data in seconds, preserve what you need to, and export data as needed for outside review. But we've added a whole host of new features to refine what you're searching for. In this session, Proofpoint experts will focus on how to leverage these new features and highlight how to better use some of the existing tools. Join us to learn:


• How Proofpoint delivers on its industry-leading SLA through blazing fast search performance, coupled with flexible filtering and options for managing results

• How ease-of-use is built into our e-discovery workflow, empowering non-technical users for self-service through a unified user experience from basic through advanced capabilities

• How advanced features enable you to perform more analysis, processing and culling in house, helping reduce related costs

12:55PM-1:40PM

Tech Session: Case Management - Maximize Legal Process Efficiency

Mukul Aggarwal, Senior Product Manager, Proofpoint

Davin Stilson, Manager of Sales Engineering, Proofpoint


We've added a very powerful new feature to our E-Discovery Analytics module this year, and that is Case Management. This session focuses on how it can enhance your legal process, increase your efficiency and productivity, and ultimately save you time and money. Join us for a discussion and demo of Case Management, with particular focus on:


• What challenges Case Management solves for customers

• Increased collaboration and orchestration for streamlining your e-discovery workflow

• Enhanced visibility over process, activity and tasks for improved efficiency

1:45PM-2:30PM

Tech Session: How to Mitigate Compliance Risk with Intelligent Supervision

Rick Dales, Vice President of Product Management, Proofpoint

John Pepe, Market Development Principal of Financial Services, Proofpoint


"Businesses are becoming aware of the need to monitor employee communications and mitigate risk associated with electronic communications. Once the domain for primarily financial services organizations, supervision technology now extends to many other vertical markets and industries. Discover the latest approach to protect your organization from legal, regulatory, and reputational risk. Join us to learn insights on:


• What does a Compliance Risk Mitigation program look like and why is it critical for your organization, including trends driving adoption

• How Proofpoint can help you implement your Compliance Risk Mitigation program

• What best practices can be shared through learnings from customers who’ve started their journey

10:20AM-11:05AM

Technology Strategies to Better Secure the All-Remote Enterprise

Lucia Milica, Resident CISO, Proofpoint

John Checco, Resident CISO, Proofpoint


The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

11:10AM-11:40AM

Predictions Beyond 2020 for Financial Services: "What a Long Strange Trip It’s Been" (Grateful Dead)

John Checco, Resident CISO, Proofpoint

Sean Odowd, Financial Services Solutions, Proofpoint


The repercussions of 2020 are far from over. This session explores what may happen in global financial services:


• How will insurance, commercial banking, and capital markets fundamentally change?

• Will regulators change how they assess and operate?

• What new areas of risk can we expect to arise?

11:45AM-12:15PM

Protecting Your Health System from BEC Attacks

Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint


Cybercriminals today are targeting health systems using fraudulent emails to clinical staff, administrators, and business associates within the supply chain. In this panel, we’ll hear more about these frighteningly effective attacks and learn how to empower your people to know a legitimate request from a con.

12:20PM-12:50PM

Coming Soon!

12:55PM-1:40PM

Speaking Your CFO's Language

Paul Auvil, Chief Financial Officer, Proofpoint


Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.

1:45PM-2:30PM

People-Centric Security from a Government Perspective

Bruce Brody, Resident CISO, Proofpoint


Government organizations have unique drivers and compliance requirements. This session will focus on how a people-centric approach can help government organizations make more progress against protecting systems, networks, and people from those who wish to do them harm.

2:35PM-3:20PM

BEC Attacks in Academia – Who’s Impersonating Whom?

Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint


The 2020 Verizon DBIR cited BEC as one of the most problematic attack types in academia. This session features a presentation and panel discussion that outlines who cybercriminals are targeting in teaching institutions, the most impactful lures being deployed, and tactics to thwart the bad actors.

 

Day 1

All events listed in PDT

Session

8:30AM-8:45AM

Protect Pre-Game Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

8:45AM-9:15AM

Proofpoint Welcome Keynote with Gary Steele, CEO

Gary Steele, Chief Executive Officer, Proofpoint


Learn about the latest innovations we're delivering in people-centric security, as well as our continued commitments to delivering new insights that resonate from the SOC to the boardroom. Gary will also highlight our continued investments in our customers’ experience and the latest developments with our security ecosystem partners.

9:15AM-9:25AM

Protect Studio Updates

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

9:25AM-10:30AM

Risky Business Live

Ryan Kalember, Executive VP of Cybersecurity Strategy, Proofpoint

Sherrod DeGrippo, Sr. Director of Threat Research and Detection, Proofpoint

Patrick Gray, Risky.Biz


Join Patrick Gray, the host of the world’s most influential infosec podcast as he discusses the latest in the threat landscape with Proofpoint’s own Sherrod DeGrippo. Afterward, Patrick will tackle some of the thorniest issues in cybersecurity with an expert panel of leading CISOs and Proofpoint’s Ryan Kalember.

10:30AM-10:40AM

Protect Half-Time Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

10:40AM-11:10AM

James Veitch

Ryan Kalember, Executive VP of Cybersecurity Strategy, Proofpoint

James Veitch, Comedian and Writer

11:10AM-11:20AM

Protect Post-Game Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

11:20AM-2:30PM

Content Tracks

11:20AM-12:10PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director, Security Research, Proofpoint


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

12:15PM-12:45PM

A Blueprint to Defend Against Business Email Compromise (BEC) and Email Account Compromise (EAC)

Sara Pan, Senior Product Marketing Manager, Proofpoint


BEC and EAC have cost organizations $26B over a three-year-period. How can your organization best protect itself against these costly threats? Join this Proofpoint customer session to hear about strategies, best practices and lessons learned to defend against BEC and EAC.

12:50PM-1:20PM

Improving Email Security with an Integrated, Multi-layered Blueprint

Cheryl Tang, Director of Product Marketing, Proofpoint


The modern threat landscape is increasingly complex. Email continues to be the number 1 threat vector. Many organizations use multiple security solutions to address this complex security problem. Join this Proofpoint customer session to learn how an integrated, multi-layered solution can improve your security posture and simplify your management overhead.

1:25PM-1:55PM

Stopping Identity Deception with DMARC

Tanner Luxner, Product Marketing Manager, Proofpoint


Identity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC.

2:00PM-2:30PM

Reducing Phishing Attacks and Operational Costs through Automation

Tanner Luxner, Product Marketing Manager, Proofpoint


With email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

11:20AM-12:10PM

Threat Actors' New Blueprint: Combining Email and Cloud Threats

Chris Iezzoni, Field Intelligence Director, Proofpoint

Roie Cohen-Duwek, Director, Security Research, Proofpoint


The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

12:15PM-12:45PM

Bypassing MFA for Cloud Apps

Or Safran, Sr. Threat Detection Analyst, Proofpoint


Recent Proofpoint and Cloud Security Alliance survey shows that only 38% of organizations use Multi-factor Authentication (MFA) to protect their cloud applications. While adoption of MFA for cloud apps is advisable, it is possible to bypass MFA using methods like real-time phishing or by taking advantage of vulnerabilities. Proofpoint will demo newest tactics in bypassing MFA for cloud applications.

12:50PM-1:20PM

Protecting Your Cloud Data with Proofpoint CASB

Itir Clarke, Sr. Product Marketing Manager, Proofpoint


With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

1:25PM-1:55PM

Deploying Zero Trust with Proofpoint

Chen Nisnkorn, Sr. Director of Technical Sales, Proofpoint


Zero trust is a term that is being used broadly, but what does it really mean? And what does it take for an organization to adopt a zero trust architecture? For many, starting the deployment of zero trust technology can be quick - see how Proofpoint can start you on your journey.

2:00PM-2:30PM

Strategies for Access Controls – CASB, Browser Isolation and ZTNA

Neko Papez, Product Marketing Manager, Proofpoint


Join this session to hear about how Proofpoint customers are addressing access through adaptive access controls in CASB, Browser Isolation, and Zero Trust Network Access (ZTNA). Hear about integrations with threat intelligence, granular policies, and multiple enforcement options.

11:20AM-12:10PM

The New Blue Print: The Future of People-Centric Information Protection

Ryan Kalember, EVP of Cybersecurity Strategy, Proofpoint

David Knight, EVP and GM of Cloud Security Group, Proofpoint


A people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy and investments. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era.

12:15PM-12:45PM

Deep Dive: The Future of People-Centric Information Protection

Tim Choi, VP of Product Marketing, Proofpoint

Alex Kremer, VP of Chief Architect, Proofpoint


Take a deep dive into the Information Protection platform. Tour the new innovations, and learn about key platform design principles to address privacy, anonymization, access controls, and more. If you have email DLP, CASB, or ITM, hear how you can get started today.

12:50PM-1:20PM

Coming Soon!

1:25PM-1:55PM

Introducing the Next Generation of People-Centric Insider Threat Management Technology

Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint


Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

2:00PM-2:30PM

Panel discussion: The Evolution of the Insider Threat

Mike McKee, EVP and GM for Insider Threat Management, Proofpoint


Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutions related to insider threat management.

11:20AM-12:10PM

People-Centric Compliance for your Digital Transformation Journey

Darren Lee, EVP & GM of Compliance and Archiving, Proofpoint


Proofpoint Compliance's vision for the next 1 - 3 years; covering market trends, challenges, and help guide customers on where best to place their compliance investments within an end-to-end technology stack that is or will be going through digital transformation.

12:15PM-12:45PM

2020 In Review: Learnings for Compliance Leaders

Amanda Anderson, Product Marketing Manager, Proofpoint


The global pandemic has forced people across demographics to make drastic lifestyle changes overnight. Similarly, businesses and organizations have had to adapt and align policies to the ""new normal"" brought on by travel restrictions and mostly remote workforces. Join us for an informative breakout where our customer panel will share what they've learned during the turbulent first half of 2020.


We'll ask them:

• How shelter-in-place orders and other restrictions impacted their compliance teams

• What parts of their processes and programs have they had to change

• What long-term changes they anticipate making in response to their learnings

12:50PM-1:20PM

Best Practices for Balancing Risk and Reward with Social Media and Digital Communications

Amanda Anderson, Product Marketing Manager, Proofpoint


New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.


In this session, you'll learn:

• Important considerations for how you capture and manage communications data

• How to scale supervision of public-facing channels

• How to avoid common pitfalls and roadblocks

1:25PM-1:55PM

Simplify Your Legacy Data Migration Strategy with Ease

Thalli Badrinath, Senior Director of Professional Services, Proofpoint

Mark DiGiovanni, Senior Manager of Professional Services, Proofpoint


As data migration size increases from Terabytes to Petabytes, imports include more than just messages, coupled with speed expectations and compliance needs has required PFPT to innovate and automate. This session will go into how we have adapted to this need and what we have done.

2:00PM-2:30PM

Augmenting Microsoft 365 Solutions with Proofpoint Capture & Archiving

Shawn Aquino, Senior Product Marketing Manager, Proofpoint

Terry McMahon, Senior Systems Engineer, Proofpoint


No single vendor can be everything to everyone. Not Microsoft. Not even Proofpoint. And when it comes to archiving and compliance initiatives, there are compelling reasons to augment Office 365 (now Microsoft 365) with Proofpoint Enterprise Archive and Proofpoint Content Capture. Attend this session to learn some of the significant ways Proofpoint can help your organization when it comes to capturing a wide array of content for compliance initiatives and storing it long-term to meet your business and regulatory information retention requirements.


Join us for insights on:

• The best methods for capturing Microsoft email and Teams communications

• How much easier to use Proofpoint e-discovery technology is than the Microsoft features you’ve implemented or are considering

• How to mitigate communications risks for regulatory and internal compliance purposes with Enterprise Archive and Proofpoint Intelligent Supervision

12:15PM-12:45PM

Security Awareness Training: One CISO’s Journey from "Doubter to Believer”

Alan Levine, CISO Advisor


Hear from a former Fortune 500 CISO, Alan Levine about how he didn’t believe in security awareness training — until a nation-state attack on his organization revealed the value of including users in a defense-in-depth strategy.

12:50PM-1:20PM

Roadmap: Integrating Security Awareness Training into your security program


Understand how Proofpoint is using our people-centric strategy to offer the right training, to the right people, to get the right response. Integrations with Proofpoint email security solutions can offer an effective, streamlined way to give your end users customized training.

1:25PM-1:55PM

Customer Story: Building on a Solid Foundation

Mark Guntrip, Director of Product Marketing


Efficacy is one of the keys to Proofpoint’s success. Though technical controls are essential to reduce people-centric risk, it’s important to build a culture of security awareness and empower users to be resilient against today’s attacks. Learn how companies have taken this important step.

2:00PM-2:30PM

Building a Successful Security Awareness Month Campaign

Susan Mackowiak, Sr. Director of Program Content, Proofpoint

Gretel Egan, Sr. Security Awareness and Training Strategist of CSAP, Proofpoint


Do you find yourself scrambling to put together a plan for Cyber Security Awareness Month in October? We will walk you through a new offering, Campaigns, where we outline timelines, engagement ideas, internal communication resources and content to help you deliver a successful program.

11:20AM-12:10PM

An Overdue Shift to People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Sherrod DeGrippo, Senior Director of Threat Research and Detection, Proofpoint


The forces of digital transformation are reshaping work and cyber trends at light speed. This session will explain why the shift to people-centric security is relevant, urgent, and long overdue. We will introduce a new framework with practical guidance for CISOs to implement and evolve their strategy.

12:15PM-12:45PM

Introducing Nexus Risk Dashboard


Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.

12:50PM-1:20PM

Strategies for Engaging with Your Board of Directors

Lucia Milica, Resident CISO, Proofpoint


Today’s CISOs must answer to the business and the board. Benchmarks, maturity models, and frameworks help facilitate those conversations. This session will share such strategies, tools, and data to help you build your next presentation and guarantee the attention of your company board.

1:25PM-1:55PM

Protecting Healthcare From Cyberattacks During a Pandemic and Beyond

Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint


This past year, Proofpoint researchers noted a surge in attacks with health-related topics, specifically COVID-19, as the lure of choice.


Join our speakers as they share:

• Rapid evolution of healthcare-themed phishing

• Research on the most attacked healthcare job functions

• Controls and strategies to protect your people and patients

2:00PM-2:30PM

Coming Soon!

Day 2

All events listed in PDT

Session

8:30AM-8:45AM

Proofpoint Live from Home

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

8:45AM-9:15AM

A cybersecurity keynote presentation unlike anything you’ve seen before

Ryan Kalember, Executive VP of Cybersecurity Strategy, Proofpoint

9:15AM-9:25AM

Protect Half-Time Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint

9:25AM-9:55AM

The New Blueprint with Proofpoint Security and Compliance

David Knight, EVP and GM of Security Products, Proofpoint


Whether your challenge is business email compromise, cloud security, or securing newly remote workers, Proofpoint’s people-centric roadmap is delivering the innovations to keep your people protected. Join Proofpoint’s David Knight to hear about what we’ve delivered and what we’re building across our email security, cloud security, information protection, and security awareness training product lines. From new detection techniques to stop the latest attacker innovations to incredible new risk analytics, this session will help you look at your own security blueprint with new eyes.

9:55AM-10:15AM

Protect Post-Game Show

Blake P. Sallé, Chief Revenue Officer, Proofpoint

Ashan Willy, EVP and GM of Security Products and Services, Proofpoint

Nate Chessin, VP of Worldwide Systems Engineering, Proofpoint

Tim Choi, Vice President, Product Marketing, Proofpoint


Blake Salle, Chief Revenue Officer will provide the closing address to Protect conference and offer suggested next steps on how to take full advantage of your new blue print with Proofpoint as we all continue to protect your most valuable asset – your people.

10:20AM-3:20PM

Content Tracks

10:20AM-12:15PM

Email Security Roadmap

Rajneesh Chopra, Vice President of Product Management, Proofpoint

Tony Paterra, Vice President of Product Management, Proofpoint


Because attackers don't stop, we don't stop innovating and advancing our email security capabilities. Join this session as Proofpoint product experts unveil the blueprint for the future of Proofpoint Email Security. You'll hear about our long-term vision as well as soon to be available capabilities.

12:20PM-12:50PM

Leverage VAPs as a Blueprint to Apply Adaptive Controls

Brett Shaw, Sr. Product Marketing Manager, Proofpoint


In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks.

12:55PM-1:40PM

Best Practices: Office 365 with Proofpoint

Michael Beninda, Director of Professional Services, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

1:45PM-2:30PM

Best Practices: Preventing Business Email Compromise and Email Account Compromise

Jessica Greer, Director of Professional Services, Proofpoint

Mike Olden, Principal Consultant, Proofpoint


Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC.

2:35PM-3:20PM

Best Practices: Implementing DMARC for Inbound Email

Rob Fleming, Principal Consultant, Proofpoint

Christophe Wolfhugel, Principal Consultant, Proofpoint


Many organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security.

10:20AM-11:05AM

Technology Strategies to Better Secure the All-Remote Enterprise

Lucia Milica, Resident CISO, Proofpoint

John Checco, Resident CISO, Proofpoint


The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

11:10AM-12:15PM

Cloud Security Roadmap

Proofpoint Product Management Team


Learn how Proofpoint is innovating to enable organizations to make the shift to the cloud secure. Our cloud security roadmap incorporates CASB, zero trust, application security and isolation technologies to provide a solution that solves the business problems of transitioning security to the cloud.

12:20PM-12:50PM

Moving Network Security to the Cloud

Eric Schwake, Manager of Product Marketing, Proofpoint

Micha Rave, Senior Director of Product Management, Proofpoint


The network was the place that was protected above all else, the thing that connected all users, applications and data. But now that the Internet IS the network, how do we still implement security to the same level of effectiveness? Learn how Proofpoint is enabling organizations to shift their security stack to the cloud in an integrated scalable way.

12:55PM-1:40PM

Best Practices: Office 365 Security with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

1:45PM-2:30PM

Best Practices: Governing third-party OAuth apps and scripts

Izak Karmona, Principal Consultant, Proofpoint

Nikos Nikolaou, Director of Professional Services, Proofpoint


If you are looking for a framework to governing third-party OAuth apps and reducing your attack surface, look no further than Proofpoint CASB. In this workshop, you will learn how to defend against malicious apps, evaluate new authorizations and existing apps for risk and define app governance policies.

2:35PM-3:20PM

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Justin Collins, Senior Director of Professional Services, Proofpoint

Jessica Greer, Director of Professional Services, Proofpoint


Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

10:20AM-11:05AM

Technology Strategies to Better Secure the All-Remote Enterprise

Lucia Milica, Resident CISO, Proofpoint

John Checco, Resident CISO, Proofpoint


The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

11:10AM-11:40AM

Information Protection & Privacy

Lucia Milica, Resident CISO, Proofpoint

Mike Stacy, Sr. Director of Advanced Technologies, Proofpoint


Hear from our experts on what you should consider to successfully protect information while addressing privacy.

11:45AM-12:15PM

Practitioner Strategies for the Work From Home Enterprise

Matt Lyle, Professional Services Architect, Proofpoint

Mike Olden, Principal Consultant, Proofpoint


The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint customers sharing their stories and strategies related to their experience adapting to the new normal of work from home.

12:20PM-12:50PM

Best Practices: 5 Steps to Jumpstarting your ITM Program

Deborah Watson, Senior Security Advisor, Proofpoint


Building an Insider Threat Management program is a complicated endeavor. Practitioners should lean on proven frameworks to design programs for their organizations. Join the architect of Proofpoint's ITM Jumpstart Services for a discussion of the 5 steps for building a world class ITM program.

12:55PM-1:40PM

Best Practices: Office 365 Security with Proofpoint

Michael Beninda, Principal Consultant, Proofpoint

James Knight, Principal Consultant, Proofpoint


As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

1:45PM-2:30PM

Best Practices: Building an Information Protection Program

Justin Collins, Senior Director of Professional Services, Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint


Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.

2:35PM-3:20PM

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Justin Collins, Senior Director of Professional Services, Proofpoint

Jessica Greer, Director of Professional Services, Proofpoint


Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

10:20AM-11:05AM

Why Intelligence Matters when Addressing Your Pressing E-Discovery and Supervision Challenges

Shawn Aquino, Senior Product Marketing Manager, Proofpoint

Terry McMahon, Senior Systems Engineer, Proofpoint


An "intelligent solution can certainly leverage machine learning or artificial intelligence. At Proofpoint, however, we see intelligence" as a trifecta that spans Detection, Automation, and Visualization in features that help improve efficiency, reduce costs and more. In this session, we’ll peer into specific ways Proofpoint has woven intelligent innovations into its archiving technology to solve real customer challenges. Join us for insights on:


• Using Intelligent Supervision and features such as Compliance Risk Dashboard and Review Sets to detect inappropriate behavior

• Using automation through Technology Assisted Review in-house to help reduce costs and improve accuracy

• Using advanced e-discovery features for enhanced visualization to better understand the nature of the data you have

11:10AM-12:15PM

Roadmap: What's Next in the Evolution of Compliance and Recordkeeping Technology

Rick Dales, Vice President of Product Management, Proofpoint

Chris Tebo, VP of Engineering and Archiving CTO, Proofpoint


Proofpoint Product and Engineering come together to talk about how the digital communications landscape is evolving, what this means for compliance & information management teams, and how Proofpoint compliance products will evolve to support these changes

12:20PM-12:50PM

Tech Session: Proofpoint E-Discovery - Everything You Need for Investigations

Dave Ely, Director of Product Management, Proofpoint

Davin Stilson, Manager of Sales Engineering, Proofpoint


Proofpoint Enterprise Archive already has plenty of great e-discovery features to help you search your data in seconds, preserve what you need to, and export data as needed for outside review. But we've added a whole host of new features to refine what you're searching for. In this session, Proofpoint experts will focus on how to leverage these new features and highlight how to better use some of the existing tools. Join us to learn:


• How Proofpoint delivers on its industry-leading SLA through blazing fast search performance, coupled with flexible filtering and options for managing results

• How ease-of-use is built into our e-discovery workflow, empowering non-technical users for self-service through a unified user experience from basic through advanced capabilities

• How advanced features enable you to perform more analysis, processing and culling in house, helping reduce related costs

12:55PM-1:40PM

Tech Session: Case Management - Maximize Legal Process Efficiency

Mukul Aggarwal, Senior Product Manager, Proofpoi

Davin Stilson, Manager of Sales Engineering, Proofpoint


We've added a very powerful new feature to our E-Discovery Analytics module this year, and that is Case Management. This session focuses on how it can enhance your legal process, increase your efficiency and productivity, and ultimately save you time and money. Join us for a discussion and demo of Case Management, with particular focus on:


• What challenges Case Management solves for customers

• Increased collaboration and orchestration for streamlining your e-discovery workflow

• Enhanced visibility over process, activity and tasks for improved efficiency

1:45PM-2:30PM

Tech Session: How to Mitigate Compliance Risk with Intelligent Supervision

Rick Dales, Vice President of Product Management, Proofpoint

John Pepe, Market Development Principal of Financial Services, Proofpoint


Businesses are becoming aware of the need to monitor employee communications and mitigate risk associated with electronic communications. Once the domain for primarily financial services organizations, supervision technology now extends to many other vertical markets and industries. Discover the latest approach to protect your organization from legal, regulatory, and reputational risk.


Join us to learn insights on:

• What does a Compliance Risk Mitigation program look like and why is it critical for your organization, including trends driving adoption

• How Proofpoint can help you implement your Compliance Risk Mitigation program

• What best practices can be shared through learnings from customers who’ve started their journey

10:20AM-11:05AM

Technology Strategies to Better Secure the All-Remote Enterprise

Lucia Milica, Resident CISO, Proofpoint

John Checco, Resident CISO, Proofpoint


The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

11:10AM-11:40AM

Predictions Beyond 2020 for Financial Services: “What a Long Strange Trip It’s Been” (Grateful Dead)

John Checco, Resident CISO, Proofpoint

Sean Odowd, Financial Services Solutions, Proofpoint


The repercussions of 2020 are far from over. This session explores what may happen in global financial services:


• How will insurance, commercial banking, and capital markets fundamentally change?

• Will regulators change how they assess and operate?

• What new areas of risk can we expect to arise?

11:45AM-12:15PM

Protecting Your Health System from BEC Attacks

Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint


Cybercriminals today are targeting health systems using fraudulent emails to clinical staff, administrators, and business associates within the supply chain. In this panel, we’ll hear more about these frighteningly effective attacks and learn how to empower your people to know a legitimate request from a con.

12:20PM-12:50PM

Coming Soon!

12:55PM-1:40PM

Speaking Your CFO's Language

Paul Auvil, Chief Financial Officer, Proofpoint


Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.

1:45PM-2:30PM

People-Centric Security from a Government Perspective

Bruce Brody, Resident CISO, Proofpoint


Government organizations have unique drivers and compliance requirements. This session will focus on how a people-centric approach can help government organizations make more progress against protecting systems, networks, and people from those who wish to do them harm.

2:34PM-3:20PM

BEC Attacks in Academia – Who’s Impersonating Whom?

Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint


The 2020 Verizon DBIR cited BEC as one of the most problematic attack types in academia. This session features a presentation and panel discussion that outlines who cybercriminals are targeting in teaching institutions, the most impactful lures being deployed, and tactics to thwart the bad actors.