The best of Proofpoint Protect + Wombat Wisdom in one premier event

Whether it’s security, compliance or digital transformation, business is changing faster than ever. Navigate today’s biggest challenges at Proofpoint Protect 2019, our premier customer event. Learn about the latest threat trends and techniques. And see how people-centric cybersecurity and compliance can keep you a step ahead.

Protect brings together hundreds of thought leaders around the globe—along with the best cybersecurity and compliance minds in the business—for a provocative, timely agenda designed to inform, engage and inspire. We’re hosting Security, Compliance, and Security Awareness Training tracks, breakout sessions, hands-on workshops, and more, so you’ll learn about the latest threat trends and leave knowing what it takes to become an organization built for the modern enterprise.

Are you interested in attending but not sure how to justify your trip? You’ve come to the right place!

Download the letter

2 Days

Join us September 4-5 for two jam-packed days of learning, networking, and inspiration!

Expert Speakers

Featuring the brightest minds in cybersecurity to share their expertise and insight.

Knowledge Exchange

Join like-minded modern security and compliance professionals to network and share.

Track Sessions

Find the sessions that fit you – security, compliance, and security awareness training.

Agenda Option 4

Agenda


Day 1

7:30AM-9:00AM

Registration & Continental Breakfast

9:00AM-10:15AM

Proofpoint Protect Welcome

10:15AM-10:30AM

Break

10:30AM-11:00AM

Guest Keynote

11:00AM-12:00PM

The VAP Treatment: the People-centric Journey for 3 Leading Organizations

12:00PM-1:00PM

Networking Lunch

1:00PM-4:50PM

Breakouts

1:00PM-1:50PM

Improving Email Security in the Face of More Complex Threats

Mark Guntrip, Group Product Marketing Director, Proofpoint

Cheryl Tang, Director of Product Marketing, Proofpoint

David McLeod, VP & CISO, Cox Enterprises


A growing number of organizations around the world use multiple solutions to solve a complex security problem. In this session, you'll learn how you can use an integrated solution to improve your security posture and simplify your management overhead.

Moving to the Cloud-Key Security and Compliance Considerations You Need to Keep in Mind

Cat Hwang, Director of Product Management, Proofpoint

Mark Guntrip, Group Product Marketing Director, Proofpoint


Moving the cloud introduces new challenges—from identifying and blocking account compromise to ensuring your data is ready for legal discovery. Hear about the critical requirement for your security and compliance teams to move to the cloud. And learn how other organizations have successfully tackled this problem measured improvement metrics.

Protecting Your Human Attack Surface in Your Business Ecosystem

Jenn Cheng, Director of Product Marketing, Proofpoint


Do you know if your supply chain, business associates or ecosystem partners are putting your organization at risk? The human attack surface is more than just your employees. People you do business with may be sending malicious or fraudulent messages via email or social media to your employees as a result of a broader breach or compromised accounts.


We'll share our threat research findings and discuss how this problem has impacted companies in financial services, healthcare and manufacturing. We'll address how to assess cyber risk in your business ecosystem and, ultimately, better protect your people. Hear firsthand from a Proofpoint customer on how they tackled this problem.

2:00PM-2:50PM

Customer Experiences using TAP for People-Centric Security

Eric Schwake, Manager of Product Marketing, Proofpoint


As attackers continue focusing on attacks that directly target your users, it’s critical that your security tools provide a people-centric approach to handling these threats. Join this interactive session to learn how our customers have been using Targeted Attack Protection (TAP) to prevent the spread of targeted threats, and how they get visibility into who these attackers are going after and how.

Stanford University: Extending Information Protection to the Cloud with CASB

Itir Clarke, Senior Product Marketing Manager, Proofpoint

Mike Takahashi, Program Manager of File Storage Security, Stanford University


Cloud security has become a board level concern. Organizations are seeking CASB platforms that can seamlessly extend their information protection programs to the cloud. In 2017, in response to file storage security incidents, Stanford University decided to expand its data loss prevention (DLP) capabilities. The university needed a DLP solution that spans multiple channels, including email, on-premises files shares, and cloud apps and services such as Office 365, Dropbox, Salesforce, Slack, and Amazon S3. Join us to find out more about Stanford’s information protection practices and their DLP journey:


• Cloud adoption strategy

• Data security and privacy challenges in the cloud era

• Unified DLP

• How the project was financially justified and resourced

• Solution selection criteria

Accelerating Incident Response with LPL Financial

Brett Shaw, Sr. Product Marketing Manager, Proofpoint

Joseph Yun, Security Automation & Orchestration Principal Architect, Proofpoint

Mark Trottier, AVP of Security Engineering and Architecture, LPL Financial


In this breakout session, you will learn how Proofpoint helps organizations proactively protect their people by accelerating the response process for reported messages, the abuse mailbox and containing threats across their organization. You will also have the opportunity to see a live demo and hear how LPL Financial leverages these solutions to bolster their defenses against future attacks targeting their people.

2019 Threat Landscape Update

Sherrod DeGrippo, Sr. Director of Threat Research and Detection, Proofpoint


In this session, we'll discuss the techniques and trends in the current threat landscape. You'll come away with a deeper understanding of the attacks against individuals in your organization. You'll also learn how attackers leverage a combination of social engineering and malware to gain access to their target organizations.

2:50PM-3:15PM

Afternoon Break

3:15PM-4:05PM

Turning the Tables: Transform End Users from Risky to Ready

Mike Bailey, Sr. Product Marketing Manager, Proofpoint


InfoSec departments have long struggled with end users interacting with malicious emails. The problem is getting worse as newer generations enter the workforce and attacks get more sophisticated. The answer to this problem requires a complete reversal in how InfoSec departments understand, train and engage with their people. Using the approach that people have little knowledge of how to protect themselves but can be educated about how to spot and report malicious emails, you'll equip your users with the knowledge and tools they need. This empowers them to become a strong last line of defense and a reporting mechanism against even the most sophisticated attacks.

Adopting Browser Isolation as an Adaptive Security Control

Eric Schwake, Manager of Product Marketing, Proofpoint

Marc Cox, Associate Director Information Security, Total System Services


As threat actors increase their reliance on malicious URLs to attack users, it’s time for security teams to think about additional adaptive controls to protect their users. Proofpoint Browser and Email Isolation integrate with TAP to allow isolation of URL clicks based on the risk profile of the users and/or the specific URL being clicked. Join this session to see the integration in action and hear from your peers about how they use isolation to enhance their security and realize IT cost savings.

Dialing in DMARC and Strengthening Your Gateway Defenses to Stop Email Fraud

Ryan Terry, Manager of Product Marketing, Proofpoint

Robert Holmes, VP of Products, Proofpoint

Iza Kosterkiewicz, Project Manager, Accenture


Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. Learn how Accenture is using Proofpoint Email Fraud Defense (EFD) to deploy DMARC email authentication and how this additional security layer is helping them stop email fraud in its tracks. We'll show you how EFD helps simplify DMARC implementation and strengthen your secure email gateway to protect your employees, customers, and business partners.

Using People-Centric Language to Explain Security to the Board

Lucia Milica, Resident CISO, Proofpoint


Communicating updates to executive staff and the board of directors is part of the responsibility of a Chief Information Security Officer. Come learn how the language of people-centric security can be used to communicate your security program, incidents and budget requests to the leaders in your organization. This session is supplemented with the workshop, "Building Your Board Presentation with People-Centric Security."

4:15PM-5:00PM

Next-Level People Protection with Proofpoint and Okta

Jenn Cheng, Director of Product Marketing, Proofpoint


Proofpoint and Okta are taking visibility and protection of your Very Attacked People (VAPs) to the next level. By combining threat intelligence with identity insights, we provide a new and enriched view of people-centric risk. From there, we'll discuss key uses cases and integration points to make management and protection more automated and easier for you. Join this session to learn how you can make the most of our newest technology integration.

Zero-Trust Network Access for a People-Centric World

Amy Ariel, Marketing, Proofpoint


This session examines Software Defined Perimeter solutions as a compelling alternative to traditional VPNs. VPNs weren’t designed for the post-perimeter world. They expose a large attack surface and get complicated to manage at cloud scale. The next generation of secure remote access, SDPs offer zero-trust security, simple cloud-delivered management, and a seamless user experience.

Protecting Your Brand against Domain Fraud and Social Impersonations

Roman Tobe, Manager of Product Marketing, Proofpoint


Your brand’s attack surface extends beyond email and cloud accounts. Cyber criminals create fake social media accounts and register fraudulent domains that appear to represent your brand and people in order to attack your supply chain or gain access to sensitive data. These impersonations can be difficult to detect without persistent monitoring of the entire digital landscape. Learn how Proofpoint can help protect your organizations, brand and people from these targeted attacks.

1:00PM-1:45PM

Security Awareness Training Track Overview

Joe Ferrara, SVP & GM of Security Awareness Training, Proofpoint

Gary Steele, Chief Executive Officer and Chairman of the Board, Proofpoint


Gary Steele and Joe Ferrara will welcome you to the security awareness track and talk about why security awareness is such an important part of the Proofpoint people-centric approach to cybersecurity.

1:55PM-2:40PM

Proofpoint Security Awareness Training: Vision and Roadmap

Al Himler, Senior Director of Product Management, Proofpoint

Shani Mahler, Product Manager, Proofpoint

Joe Lipple, Product Manager, Proofpoint

Matt Lane, Sr. Product Manager, Proofpoint

Mark Wuslich, Sr. Product Manager, Proofpoint

Ali Mazzotta, Sr. Product Manager, Proofpoint

Susan Mackowiak, Sr. Director of Program Content, Proofpoint


In this session, our Proofpoint Security Awareness product management team will talk about some of the product updates we have made over the past year and what how Proofpoint will continue to lead the way in security awareness training innovation in the future.

2:40PM-3:10PM

Afternoon Break

3:10PM-4:00PM

Customer Case Study: Implementing and Maintaining a Successful Cybersecurity Awareness Program


Learn how a Fortune 500 telecommunications company has implemented a very successful security awareness program, running over 700,000 unique phishing campaigns and the things they have done to get executive buy-in and end user engagement.

4:05PM-4:50PM

Tailor Your Content to Deliver More Meaningful Security Awareness

Shani Mahler, Product Manager, Proofpoint


Training isn’t one size fits all. Learn how you can use our products to tailor training content to speak to each of your security policies and procedures, and how you can reuse the content to teach different roles within your organization. We will demonstrate how our Learning Science Evaluator will help to ensure that your customized content is still effective in changing end-user behavior.

1:00PM-1:45PM

Regulation Now and Next: Current trends in regulation and where no next?

Michael McGrath, Senior Director of Compliance and Digital Risk, Proofpoint

Jeff Bandman, Principal Lecturer in Global Affairs, Bandman Advisors, Yale University

Frances McManus, AVP of Global Compliance, Manulife Financial


Join this session to learn more about regulatory trends and insights.

1:55PM-2:40PM

Digital Risk and Compliance Roadmap

Rick Dales, VP of Product Management, Proofpoint

Dan Nadir, VP of Product Management, Proofpoint


Hear directly from the product leadership team on upcoming innovations and how the solutions are evolving. Use this opportunity to provide feedback and inform product strategy.

2:40PM-3:10PM

Afternoon Break

3:10PM-3:55PM

Customer Voice: Finding Success Fulfilling Regulatory Requirements with Proofpoint

John Pepe, Regulatory Technology and Counsel, Proofpoint

Scott Dowling, VP Business Technology Services, LPL

Brandon Davis, Vice President, Oak Tree


Customers share how they’ve addressed their compliance needs. Hear about their challenges, why they migrated to Proofpoint, and how their solutions support their overall mission. The Chatham House Rule applies!

4:05PM-4:50PM

Industry Insights: Real-World Trends and Best Practices

John Pepe, Regulatory Technology and Counsel, Proofpoint

Jeff Bandman, Principal Lecturer in Global Affairs, Bandman Advisors, Yale University

Frances McManus, AVP of Global Compliance, Manulife Financial


How are you finding success with limited resources? What’s next to evolve your program? How do you keep your program up to date? Bring your burning questions and join this lively discussion among peers. Hear what is top of mind, common challenges and best practices. At the end of the day, you will be equipped with new ideas to advance your initiatives.

5:00PM to 6:30PM

Cocktail Reception

Day 2

7:30AM-9:00AM

Registration & Continental Breakfast

9:00AM-10:30AM

Roadmap Session (Part 1)

10:30AM-10:45AM

Break

10:45AM-12:00PM

Roadmap Session (Part 2)

9:00AM-5:00PM

Breakouts

12:00PM-1:00PM

Networking Lunch

1:00PM-1:45PM

Workshop: Augmenting Microsoft Office 365 with Proofpoint

Michael Beninda, Principal PS Consultant, Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint


The move of email to Office 365 introduces new opportunities and challenges. Proofpoint is here to help you answer the critical question, "I have moved to Office 365, now what do I do to ensure I am doing the right things to protect my O365 environment?"

Workshop: Addressing Business Email Compromise (BEC) with Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint

Mike Olden, Principal PS Consultant, Proofpoint


Business Email Compromise puts enterprises at serious risk of financial and intellectual property loss. This workshop covers BEC in detail: how you can protect against sophisticated attacks, especially by taking full advantage of your Proofpoint products.

Workshop: Implementing People-Centric Security in Your Organization

Justin Collins, Senior Director of Professional Services, Proofpoint

Jessica Greer, Sr. Mgr. Professional Services Consulting, Proofpoint


How security is viewed has continued to change as more and more services leave the corporate network. Now people are the biggest threat. In this workshop, we'll consolidate and simplify all the threats in a specific customer’s landscape, so they can prioritize and understand the risks to their people, identify which are most important to them, then act against them.

3:15PM-5:00PM

Workshop: Building Your Board Presentation with People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Ben Calvert, Chief Security Officer, Proofpoint


In this hands-on workshop, we continue our discussion from the breakout session, “Using People-Centric Language to Explain Security to the Board.” We will go through different CISO scenarios and explain how people-centric Proofpoint tools—such as Very Attacked People (VAP) reports--can help you deliver your message. Please bring your laptop to create your own customized people-centric slides.

2:00PM-2:50PM

Workshop: Augmenting Microsoft Office 365 with Proofpoint

Michael Beninda, Principal PS Consultant, Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint


The move of email to Office 365 introduces new opportunities and challenges. Proofpoint is here to help you answer the critical question, "I have moved to Office 365, now what do I do to ensure I am doing the right things to protect my O365 environment?"

Workshop: Addressing Business Email Compromise (BEC) with Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint

Mike Olden, Principal PS Consultant, Proofpoint


Business Email Compromise puts enterprises at serious risk of financial and intellectual property loss. This workshop covers BEC in detail: how you can protect against sophisticated attacks, especially by taking full advantage of your Proofpoint products.

Workshop: Implementing People-Centric Security in Your Organization

Justin Collins, Senior Director of Professional Services, Proofpoint

Jessica Greer, Sr. Mgr. Professional Services Consulting, Proofpoint


How security is viewed has continued to change as more and more services leave the corporate network. Now people are the biggest threat. In this workshop, we'll consolidate and simplify all the threats in a specific customer’s landscape, so they can prioritize and understand the risks to their people, identify which are most important to them, then act against them.

Workshop: Building Your Board Presentation with People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Ben Calvert, Chief Security Officer, Proofpoint


In this hands-on workshop, we continue our discussion from the breakout session, “Using People-Centric Language to Explain Security to the Board.” We will go through different CISO scenarios and explain how people-centric Proofpoint tools—such as Very Attacked People (VAP) reports--can help you deliver your message. Please bring your laptop to create your own customized people-centric slides.

2:50PM-3:15PM

Afternoon Break

3:15PM-4:05PM

Workshop: Augmenting Microsoft Office 365 with Proofpoint

Michael Beninda, Principal PS Consultant, Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint


The move of email to Office 365 introduces new opportunities and challenges. Proofpoint is here to help you answer the critical question, "I have moved to Office 365, now what do I do to ensure I am doing the right things to protect my O365 environment?"

Workshop: Addressing Business Email Compromise (BEC) with Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint

Mike Olden, Principal PS Consultant, Proofpoint


Business Email Compromise puts enterprises at serious risk of financial and intellectual property loss. This workshop covers BEC in detail: how you can protect against sophisticated attacks, especially by taking full advantage of your Proofpoint products.

Workshop: Implementing People-Centric Security in Your Organization

Justin Collins, Senior Director, Professional Services, Proofpoint

Jessica Greer, Sr. Mgr. Professional Services Consulting, Proofpoint


How security is viewed has continued to change as more and more services leave the corporate network. Now people are the biggest threat. In this workshop, we'll consolidate and simplify all the threats in a specific customer’s landscape, so they can prioritize and understand the risks to their people, identify which are most important to them, then act against them.

Workshop: Building Your Board Presentation with People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Ben Calvert, Chief Security Officer, Proofpoint


In this hands-on workshop, we continue our discussion from the breakout session, “Using People-Centric Language to Explain Security to the Board.” We will go through different CISO scenarios and explain how people-centric Proofpoint tools—such as Very Attacked People (VAP) reports--can help you deliver your message. Please bring your laptop to create your own customized people-centric slides.

9:00AM-10:00AM

Driving Security Awareness Results with Business Intelligence

Joe Lipple, Product Manager, Proofpoint

Kurt Wescoe, Chief Architect, Proofpoint


You’ve run your security awareness training program for a while, so now what? In this session, we will explore how you can leverage business intelligence and reporting to measure progress, evaluate performance, benchmarking, and take the next steps to improve results. Further, we will review live reports and discuss best practices, basic and advanced functionality, and how you can use your data to drive competition in your organization.

10:00AM-11:00AM

Improving End User Engagement in your Security Awareness Program

Amy Baker, Vice President of Security Awareness Training Strategy and Development, Proofpoint

Stacy Beck, Cybersecurity Education & Awareness Program Coodinator, US Steel

Joe Krock, Technology Process Manager, Humana


If it's been a challenge to get end users engaged and excited about your security awareness training program you're not alone. In this session we'll have an inspiring discussion with two Fortune 500 security awareness training veterans who have used unique approaches to ensuring engagement and strong results from their programs. Bring your burning questions to get advice and ideas from our experts.

11:00AM-11:15AM

Break

11:15AM-12:00PM

Bridging the Technology and People Divide

Mike Bailey, Sr. Product Marketing Manager, Proofpoint

Mark Guntrip, Group Product Marketing Director, Proofpoint


Proofpoint has a rich history in the email security space. We'll take you through how we identify and stop inbound malicious threats - and how we're using this knowledge to take our security awareness training offering to a new level. Our Closed Loop Email Analysis and Response (CLEAR) solution is designed to leverage our expertise in email security and security awareness to deliver a game-changing way to build a strong last line of defense with your end users and stop the most targeted attacks in their tracks.

12:00PM-1:00PM

Networking Lunch

1:00PM-2:50PM

Workshop: Building an Effective Security Awareness Program

Dale Zabriskie, Security Awareness & Training Evangelist, Proofpoint

Amy Baker, VP, Marketing, Proofpoint


In this workshop, you'll get actionable guidance about executing security awareness and training initiatives that deliver measurable results. We'll discuss proven best practices for increasing the effectiveness of cybersecurity education and building a culture of security within your organization. This includes:


• Developing a mission statement and program plan

• Getting executive buy-in

• Identifying stakeholders who can become advocates for success

• Navigating and overcoming potential obstacles

• Evaluating end-user vulnerabilities and associated risk to drive training

• Key metrics for measuring ROI and program success

2:50PM-3:10PM

Afternoon Break

3:10PM-5:00PM

Workshop: Building an Effective Security Awareness Program

Dale Zabriskie, Security Awareness & Training Evangelist, Proofpoint

Amy Baker, VP, Marketing, Proofpoint


In this workshop, you'll get actionable guidance about executing security awareness and training initiatives that deliver measurable results. We'll discuss proven best practices for increasing the effectiveness of cybersecurity education and building a culture of security within your organization. This includes:


• Developing a mission statement and program plan

• Getting executive buy-in

• Identifying stakeholders who can become advocates for success

• Navigating and overcoming potential obstacles

• Evaluating end-user vulnerabilities and associated risk to drive training

• Key metrics for measuring ROI and program success

10:00AM-11:00AM

Using Analytics for eDiscovery and Investigations

Michael McGrath, Senior Director of Compliance and Digital Risk, Proofpoint


Learn how data visualization and Technology Assisted Review (TAR) can save you human effort in the real world. Quickly find relevant items or “smoking guns” in data stored in your Proofpoint archive as part of an investigation or litigation.

11:00AM-11:15AM

Break

11:15AM-12:00PM

Be Audit Ready: A Modular Approach to Capture, Analyze and Reconcile All Electronic Communications

Michael McGrath, Senior Director of Compliance and Digital Risk, Proofpoint

John Pepe, Regulatory Technology and Counsel, Proofpoint


Feeling stretched as your business demands the use of communication beyond email? Learn how you can easily support the business, scale your IT efforts, and achieve a much higher level of audit readiness.

12:00PM-1:00PM

Networking Lunch

1:00PM-1:50PM

Financial Services: Best Practices to Monitor for Risk in Electronic Communications

John Pepe, Regulatory Technology and Counsel, Proofpoint


Learn how to scale your supervision efforts with best practices to build and maintain detection scenarios in Proofpoint Intelligent Supervision.

2:00PM-2:50PM

Compliance and Social Selling: Best Practices and Pitfalls

Dan Nadir, VP of Product Management, Proofpoint

Matthew Bryan, VP of Marketing Individual Markets, Guardian Life


Social media can enable new revenue opportunities for your sellers. Come hear best practices and lessons learned from your peers when it comes to building a successful, compliant social selling program.

1:00PM-1:50PM

Using Analytics for eDiscovery and Investigations

Michael McGrath, Senior Director of Compliance and Digital Risk, Proofpoint


Clinicians have a mission to protect and care for patients. This mission now includes cybersecurity. Shifting the security focus from compliancy to patient safety has been an important development in the industry’s cybersecurity landscape. Come hear how hospitals are evolving their security posture. You'll learn about the strategies they’re deploying and the technologies they’re using to help safeguard patient safety and, more importantly, improve patient safety.

4:05PM-4:50PM

Addressing the Strategic Security Needs of Financial and Insurance Companies

Lucia Milica, Resident CISO, Proofpoint

Dr. Clayton Chandler, Global Head of Cybersecurity, Credit Suisse AG

Mark Trottier, AVP of Security Engineering and Architecture, LPL Financial

Chris Lockery, Deputy CISO, Cigna


This panel discussion covers the security environments and challenges facing banks, broker-dealers, and insurance companies. Through use cases and a fireside chat you will understand strategic issues and what's top-of-mind for senior security executives. You will also gain insights into solutions they deploy to improve their strategic security posture in the continuously changing world of threat actors, technology, consumer behavior, and regulation. Come ready with your questions for the panel!

Day 1

Session

7:30AM-9:00AM

Registration & Continental Breakfast

9:00AM-10:15AM

Proofpoint Protect Welcome

10:15AM-10:30AM

Break

10:30AM-11:00AM

Guest Keynote

11:00AM-12:00PM

The VAP Treatment: the People-centric Journey for 3 Leading Organizations

12:00PM-1:00PM

Networking Lunch

1:00PM-4:50PM

Breakouts

1:00PM-1:50PM

Improving Email Security in the Face of More Complex Threats

Mark Guntrip, Group Product Marketing Director, Proofpoint

Cheryl Tang, Director of Product Marketing, Proofpoint

David McLeod, VP & CISO, Cox Enterprises


A growing number of organizations around the world use multiple solutions to solve a complex security problem. In this session, you'll learn how you can use an integrated solution to improve your security posture and simplify your management overhead.

Moving to the Cloud-Key Security and Compliance Considerations You Need to Keep in Mind

Cat Hwang, Director of Product Management, Proofpoint

Mark Guntrip, Group Product Marketing Director, Proofpoint


Moving the cloud introduces new challenges—from identifying and blocking account compromise to ensuring your data is ready for legal discovery. Hear about the critical requirement for your security and compliance teams to move to the cloud. And learn how other organizations have successfully tackled this problem measured improvement metrics.

Protecting Your Human Attack Surface in Your Business Ecosystem

Jenn Cheng, Director of Product Marketing, Proofpoint


Do you know if your supply chain, business associates or ecosystem partners are putting your organization at risk? The human attack surface is more than just your employees. People you do business with may be sending malicious or fraudulent messages via email or social media to your employees as a result of a broader breach or compromised accounts.


We'll share our threat research findings and discuss how this problem has impacted companies in financial services, healthcare and manufacturing. We'll address how to assess cyber risk in your business ecosystem and, ultimately, better protect your people. Hear firsthand from a Proofpoint customer on how they tackled this problem.

2:00PM-2:50PM

Customer Experiences using TAP for People-Centric Security

Eric Schwake, Manager of Product Marketing, Proofpoint


As attackers continue focusing on attacks that directly target your users, it’s critical that your security tools provide a people-centric approach to handling these threats. Join this interactive session to learn how our customers have been using Targeted Attack Protection (TAP) to prevent the spread of targeted threats, and how they get visibility into who these attackers are going after and how.

Stanford University: Extending Information Protection to the Cloud with CASB

Itir Clarke, Senior Product Marketing Manager, Proofpoint

Mike Takahashi, Program Manager of File Storage Security, Stanford University


Cloud security has become a board level concern. Organizations are seeking CASB platforms that can seamlessly extend their information protection programs to the cloud. In 2017, in response to file storage security incidents, Stanford University decided to expand its data loss prevention (DLP) capabilities. The university needed a DLP solution that spans multiple channels, including email, on-premises files shares, and cloud apps and services such as Office 365, Dropbox, Salesforce, Slack, and Amazon S3. Join us to find out more about Stanford’s information protection practices and their DLP journey:


• Cloud adoption strategy

• Data security and privacy challenges in the cloud era

• Unified DLP

• How the project was financially justified and resourced

• Solution selection criteria

Accelerating Incident Response with LPL Financial

Brett Shaw, Sr. Product Marketing Manager, Proofpoint

Joseph Yun, Security Automation & Orchestration Principal Architect, Proofpoint

Mark Trottier, AVP of Security Engineering and Architecture, LPL Financial


In this breakout session, you will learn how Proofpoint helps organizations proactively protect their people by accelerating the response process for reported messages, the abuse mailbox and containing threats across their organization. You will also have the opportunity to see a live demo and hear how LPL Financial leverages these solutions to bolster their defenses against future attacks targeting their people.

2019 Threat Landscape Update

Sherrod DeGrippo, Sr. Director of Threat Research and Detection, Proofpoint


In this session, we'll discuss the techniques and trends in the current threat landscape. You'll come away with a deeper understanding of the attacks against individuals in your organization. You'll also learn how attackers leverage a combination of social engineering and malware to gain access to their target organizations.

2:50PM-3:15PM

Afternoon Break

3:15PM-4:05PM

Turning the Tables: Transform End Users from Risky to Ready

Mike Bailey, Sr. Product Marketing Manager, Proofpoint


InfoSec departments have long struggled with end users interacting with malicious emails. The problem is getting worse as newer generations enter the workforce and attacks get more sophisticated. The answer to this problem requires a complete reversal in how InfoSec departments understand, train and engage with their people. Using the approach that people have little knowledge of how to protect themselves but can be educated about how to spot and report malicious emails, you'll equip your users with the knowledge and tools they need. This empowers them to become a strong last line of defense and a reporting mechanism against even the most sophisticated attacks.

Adopting Browser Isolation as an Adaptive Security Control

Eric Schwake, Manager of Product Marketing, Proofpoint

Marc Cox, Associate Director Information Security, Total System Services


As threat actors increase their reliance on malicious URLs to attack users, it’s time for security teams to think about additional adaptive controls to protect their users. Proofpoint Browser and Email Isolation integrate with TAP to allow isolation of URL clicks based on the risk profile of the users and/or the specific URL being clicked. Join this session to see the integration in action and hear from your peers about how they use isolation to enhance their security and realize IT cost savings.

Dialing in DMARC and Strengthening Your Gateway Defenses to Stop Email Fraud

Ryan Terry, Manager of Product Marketing, Proofpoint

Robert Holmes, VP of Products

Iza Kosterkiewicz, Project Manager, Accenture


Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. Learn how Accenture is using Proofpoint Email Fraud Defense (EFD) to deploy DMARC email authentication and how this additional security layer is helping them stop email fraud in its tracks. We'll show you how EFD helps simplify DMARC implementation and strengthen your secure email gateway to protect your employees, customers, and business partners.

Using People-Centric Language to Explain Security to the Board

Lucia Milica, Resident CISO, Proofpoint


Communicating updates to executive staff and the board of directors is part of the responsibility of a Chief Information Security Officer. Come learn how the language of people-centric security can be used to communicate your security program, incidents and budget requests to the leaders in your organization. This session is supplemented with the workshop, "Building Your Board Presentation with People-Centric Security."

4:15PM-5:00PM

Next-Level People Protection with Proofpoint and Okta

Jenn Cheng, Director of Product Marketing, Proofpoint


Proofpoint and Okta are taking visibility and protection of your Very Attacked People (VAPs) to the next level. By combining threat intelligence with identity insights, we provide a new and enriched view of people-centric risk. From there, we'll discuss key uses cases and integration points to make management and protection more automated and easier for you. Join this session to learn how you can make the most of our newest technology integration.

Zero-Trust Network Access for a People-Centric World

Amy Ariel, Marketing Proofpoint


This session examines Software Defined Perimeter solutions as a compelling alternative to traditional VPNs. VPNs weren’t designed for the post-perimeter world. They expose a large attack surface and get complicated to manage at cloud scale. The next generation of secure remote access, SDPs offer zero-trust security, simple cloud-delivered management, and a seamless user experience.

Protecting Your Brand against Domain Fraud and Social Impersonations

Roman Tobe, Manager of Product Marketing, Proofpoint


Your brand’s attack surface extends beyond email and cloud accounts. Cyber criminals create fake social media accounts and register fraudulent domains that appear to represent your brand and people in order to attack your supply chain or gain access to sensitive data. These impersonations can be difficult to detect without persistent monitoring of the entire digital landscape. Learn how Proofpoint can help protect your organizations, brand and people from these targeted attacks.

1:00PM-1:45PM

Security Awareness Training Track Overview

Joe Ferrara, SVP & GM of Security Awareness Training, Proofpoint

Gary Steele, Chief Executive Officer and Chairman of the Board, Proofpoint


Gary Steele and Joe Ferrara will welcome you to the security awareness track and talk about why security awareness is such an important part of the Proofpoint people-centric approach to cybersecurity.

1:55PM-2:40PM

Proofpoint Security Awareness Training: Vision and Roadmap

Al Himler, Senior Director of Product Management, Proofpoint

Shani Mahler, Product Manager, Proofpoint

Joe Lipple, Product Manager, Proofpoint

Matt Lane, Sr. Product Manager, Proofpoint

Mark Wuslich, Sr. Product Manager, Proofpoint

Ali Mazzotta, Sr. Product Manager, Proofpoint

Susan Mackowiak, Sr. Director of Program Content, Proofpoint


In this session, our Proofpoint Security Awareness product management team will talk about some of the product updates we have made over the past year and what how Proofpoint will continue to lead the way in security awareness training innovation in the future.

2:40PM-3:10PM

Afternoon Break

3:10PM-3:55PM

Customer Case Study: Implementing and Maintaining a Successful Cybersecurity Awareness Program


Learn how a Fortune 500 telecommunications company has implemented a very successful security awareness program, running over 700,000 unique phishing campaigns and the things they have done to get executive buy-in and end user engagement.

4:05PM-4:50PM

Tailor Your Content to Deliver More Meaningful Security Awareness

Shani Mahler, Product Manager, Proofpoint


Training isn’t one size fits all. Learn how you can use our products to tailor training content to speak to each of your security policies and procedures, and how you can reuse the content to teach different roles within your organization. We will demonstrate how our Learning Science Evaluator will help to ensure that your customized content is still effective in changing end-user behavior.

1:00PM-1:45PM

Regulation Now and Next: Current trends in regulation and where no next?

Michael McGrath, Senior Director of Compliance and Digital Risk, Proofpoint

Jeff Bandman, Principal Lecturer in Global Affairs, Bandman Advisors, Yale University

Frances McManus, AVP of Global Compliance, Manulife Financial


Join this session to learn more about regulatory trends and insights.

1:55PM-2:40PM

Digital Risk and Compliance Roadmap

Rick Dales, VP of Product Management, Proofpoint

Dan Nadir, VP of Product Management, Proofpoint


Hear directly from the product leadership team on upcoming innovations and how the solutions are evolving. Use this opportunity to provide feedback and inform product strategy.

2:40PM-3:10PM

Afternoon Break

3:10PM-3:55PM

Customer Voice: Finding Success Fulfilling Regulatory Requirements with Proofpoint

John Pepe, Regulatory Technology and Counsel, Proofpoint

Scott Dowling, VP Business Technology Services, LPL

Brandon Davis, Vice President, Oak Tree


Customers share how they’ve addressed their compliance needs. Hear about their challenges, why they migrated to Proofpoint, and how their solutions support their overall mission. The Chatham House Rule applies!

4:05PM-4:50PM

Industry Insights: Real-World Trends and Best Practices

John Pepe, Regulatory Technology and Counsel, Proofpoint

Jeff Bandman, Principal Lecturer in Global Affairs, Bandman Advisors, Yale University

Frances McManus, AVP of Global Compliance, Manulife Financial


How are you finding success with limited resources? What’s next to evolve your program? How do you keep your program up to date? Bring your burning questions and join this lively discussion among peers. Hear what is top of mind, common challenges and best practices. At the end of the day, you will be equipped with new ideas to advance your initiatives.

5:00PM-6:30PM

Cocktail Reception

Day 2

Session

7:30AM-9:00AM

Registration & Continental Breakfast

9:00AM-10:30AM

Roadmap Session (Part 1)

10:30AM-10:45AM

Break

10:45AM-12:00PM

Roadmap Session (Part 2)

9:00AM-5:00PM

Breakouts

12:00PM-1:00PM

Networking Lunch

1:00PM-1:45PM

Workshop: Augmenting Microsoft Office 365 with Proofpoint

Michael Beninda, Principal PS Consultant, Proofpoint

Nikos Nikolaou, Director of EMEA Professional Services, Proofpoint


The move of email to Office 365 introduces new opportunities and challenges. Proofpoint is here to help you answer the critical question, "I have moved to Office 365, now what do I do to ensure I am doing the right things to protect my O365 environment?"

Workshop: Addressing Business Email Compromise (BEC) with Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint

Mike Olden, Principal PS Consultant, Proofpoint


Business Email Compromise puts enterprises at serious risk of financial and intellectual property loss. This workshop covers BEC in detail: how you can protect against sophisticated attacks, especially by taking full advantage of your Proofpoint products.

Workshop: Implementing People-Centric Security in Your Organization

Justin Collins, Senior Director of Professional Services, Proofpoint

Jessica Greer, Sr. Mgr. Professional Services Consulting, Proofpoint


How security is viewed has continued to change as more and more services leave the corporate network. Now people are the biggest threat. In this workshop, we'll consolidate and simplify all the threats in a specific customer’s landscape, so they can prioritize and understand the risks to their people, identify which are most important to them, then act against them.

3:15PM-5:00PM

Workshop: Building Your Board Presentation with People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Ben Calvert, Chief Security Officer, Proofpoint


In this hands-on workshop, we continue our discussion from the breakout session, “Using People-Centric Language to Explain Security to the Board.” We will go through different CISO scenarios and explain how people-centric Proofpoint tools—such as Very Attacked People (VAP) reports--can help you deliver your message. Please bring your laptop to create your own customized people-centric slides.

2:00PM-2:50PM

Workshop: Augmenting Microsoft Office 365 with Proofpoint

Michael Beninda, Principal PS Consultant, Proofpoint

Nikos Nikolaou, Director of EMEA Professional Services, Proofpoint


The move of email to Office 365 introduces new opportunities and challenges. Proofpoint is here to help you answer the critical question, "I have moved to Office 365, now what do I do to ensure I am doing the right things to protect my O365 environment?"

Workshop: Addressing Business Email Compromise (BEC) with Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint

Mike Olden, Principal PS Consultant, Proofpoint


Business Email Compromise puts enterprises at serious risk of financial and intellectual property loss. This workshop covers BEC in detail: how you can protect against sophisticated attacks, especially by taking full advantage of your Proofpoint products.

Workshop: Implementing People-Centric Security in Your Organization

Justin Collins, Senior Director of Professional Services, Proofpoint

Jessica Greer, Sr. Mgr. Professional Services Consulting, Proofpoint


How security is viewed has continued to change as more and more services leave the corporate network. Now people are the biggest threat. In this workshop, we'll consolidate and simplify all the threats in a specific customer’s landscape, so they can prioritize and understand the risks to their people, identify which are most important to them, then act against them.

Workshop: Building Your Board Presentation with People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Ben Calvert, Chief Security Officer, Proofpoint


In this hands-on workshop, we continue our discussion from the breakout session, “Using People-Centric Language to Explain Security to the Board.” We will go through different CISO scenarios and explain how people-centric Proofpoint tools—such as Very Attacked People (VAP) reports--can help you deliver your message. Please bring your laptop to create your own customized people-centric slides.

2:50PM-3:15PM

Afternoon Break

3:15PM-4:05PM

Workshop: Augmenting Microsoft Office 365 with Proofpoint

Michael Beninda, Principal PS Consultant, Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint


The move of email to Office 365 introduces new opportunities and challenges. Proofpoint is here to help you answer the critical question, "I have moved to Office 365, now what do I do to ensure I am doing the right things to protect my O365 environment?"

Workshop: Addressing Business Email Compromise (BEC) with Proofpoint

Matt Lyle, Professional Services Architect, Proofpoint

Mike Olden, Principal PS Consultant, Proofpoint


Business Email Compromise puts enterprises at serious risk of financial and intellectual property loss. This workshop covers BEC in detail: how you can protect against sophisticated attacks, especially by taking full advantage of your Proofpoint products.

Workshop: Implementing People-Centric Security in Your Organization

Justin Collins, Senior Director of Professional Services, Proofpoint

Jessica Greer, Sr. Mgr. Professional Services Consulting, Proofpoint


How security is viewed has continued to change as more and more services leave the corporate network. Now people are the biggest threat. In this workshop, we'll consolidate and simplify all the threats in a specific customer’s landscape, so they can prioritize and understand the risks to their people, identify which are most important to them, then act against them.

Workshop: Building Your Board Presentation with People-Centric Security

Lucia Milica, Resident CISO, Proofpoint

Ben Calvert, Chief Security Officer, Proofpoint


In this hands-on workshop, we continue our discussion from the breakout session, “Using People-Centric Language to Explain Security to the Board.” We will go through different CISO scenarios and explain how people-centric Proofpoint tools—such as Very Attacked People (VAP) reports--can help you deliver your message. Please bring your laptop to create your own customized people-centric slides.

9:00AM-10:00AM

Driving Security Awareness Results with Business Intelligence

Joe Lipple, Product Manager, Proofpoint

Kurt Wescoe, Chief Architect, Proofpoint


You’ve run your security awareness training program for a while, so now what? In this session, we will explore how you can leverage business intelligence and reporting to measure progress, evaluate performance, benchmarking, and take the next steps to improve results. Further, we will review live reports and discuss best practices, basic and advanced functionality, and how you can use your data to drive competition in your organization.

10:00AM-11:00AM

Improving End User Engagement in your Security Awareness Program

Amy Baker, Vice President of Security Awareness Training Strategy and Development, Proofpoint

Stacy Beck, Cybersecurity Education & Awareness Program Coodinator, US Steel

Joe Krock, Technology Process Manager, Humana


Proofpoint has a rich history in the email security space. We'll take you through how we identify and stop inbound malicious threats - and how we're using this knowledge to take our security awareness training offering to a new level. Our Closed Loop Email Analysis and Response (CLEAR) solution is designed to leverage our expertise in email security and security awareness to deliver a game-changing way to build a strong last line of defense with your end users and stop the most targeted attacks in their tracks.

11:00AM-11:15AM

Break

11:15AM-12:00PM

Bridging the Technology and People Divide

Mike Bailey, Sr. Product Marketing Manager, Proofpoint

Mark Guntrip, Group Product Marketing Director, Proofpoint


Proofpoint has a rich history in the email security space. We'll take you through how we identify and stop inbound malicious threats - and how we're using this knowledge to take our security awareness training offering to a new level. Our Closed Loop Email Analysis and Response (CLEAR) solution is designed to leverage our expertise in email security and security awareness to deliver a game-changing way to build a strong last line of defense with your end users and stop the most targeted attacks in their tracks.

12:00PM-1:00PM

Networking Lunch

1:00PM-2:50PM

Workshop: Building an Effective Security Awareness Program

Dale Zabriskie, Security Awareness & Training Evangelist, Proofpoint

Amy Baker, VP, Marketing, Proofpoint


If it's been a challenge to get end users engaged and excited about your security awareness training program you're not alone. In this session we'll have an inspiring discussion with two Fortune 500 security awareness training veterans who have used unique approaches to ensuring engagement and strong results from their programs. Bring your burning questions to get advice and ideas from our experts.

2:50PM-3:10PM

Afternoon Break

3:10PM-5:00PM

Workshop: Building an Effective Security Awareness Program

Dale Zabriskie, Security Awareness & Training Evangelist, Proofpoint

Amy Baker, VP, Marketing, Proofpoint


In this workshop, you'll get actionable guidance about executing security awareness and training initiatives that deliver measurable results. We'll discuss proven best practices for increasing the effectiveness of cybersecurity education and building a culture of security within your organization. This includes:


• Developing a mission statement and program plan

• Getting executive buy-in

• Identifying stakeholders who can become advocates for success

• Navigating and overcoming potential obstacles

• Evaluating end-user vulnerabilities and associated risk to drive training

• Key metrics for measuring ROI and program success

10:00AM-11:00AM

Using Analytics for eDiscovery and Investigations

Michael McGrath, Senior Director of Compliance and Digital Risk, Proofpoint


Learn how data visualization and Technology Assisted Review (TAR) can save you human effort in the real world. Quickly find relevant items or “smoking guns” in data stored in your Proofpoint archive as part of an investigation or litigation.

11:00AM-11:15AM

Break

11:15AM-12:00PM

Be Audit Ready: A Modular Approach to Capture, Analyze and Reconcile All Electronic Communications

Michael McGrath, Senior Director of Compliance and Digital Risk, Proofpoint

John Pepe, Regulatory Technology and Counsel, Proofpoint


Feeling stretched as your business demands the use of communication beyond email? Learn how you can easily support the business, scale your IT efforts, and achieve a much higher level of audit readiness.

12:00PM-1:00PM

Networking Lunch

1:00PM-1:50PM

Financial Services: Best Practices to Monitor for Risk in Electronic Communications

John Pepe, Regulatory Technology and Counsel, Proofpoint


Learn how to scale your supervision efforts with best practices to build and maintain detection scenarios in Proofpoint Intelligent Supervision.

2:00PM-2:50PM

Compliance and Social Selling: Best Practices and Pitfalls

Dan Nadir, VP of Product Management, Proofpoint

Matthew Bryan, VP of Marketing Individual Markets, Guardian Life


Learn how to scale your supervision efforts with best practices to build and maintain detection scenarios in Proofpoint Intelligent Supervision.

1:00PM-1:50PM

Cybersecurity a Priority for Patient Safety

Ryan Witt, Industry Practice Leader, Healthcare, Proofpoint

Judy Hatchett, VP & CISO, Fairview Health Services


Clinicians have a mission to protect and care for patients. This mission now includes cybersecurity. Shifting the security focus from compliancy to patient safety has been an important development in the industry’s cybersecurity landscape. Come hear how hospitals are evolving their security posture. You'll learn about the strategies they’re deploying and the technologies they’re using to help safeguard patient safety and, more importantly, improve patient safety.

4:05PM-4:50PM

Addressing the Strategic Security Needs of Financial and Insurance Companies

Lucia Milica, Resident CISO, Proofpoint

Dr. Clayton Chandler, Global Head of Cybersecurity, Credit Suisse AG

Mark Trottier, AVP of Security Engineering and Architecture, LPL Financial

Chris Lockery, Deputy CISO, Cigna


This panel discussion covers the security environments and challenges facing banks, broker-dealers, and insurance companies. Through use cases and a fireside chat you will understand strategic issues and what's top-of-mind for senior security executives. You will also gain insights into solutions they deploy to improve their strategic security posture in the continuously changing world of threat actors, technology, consumer behavior, and regulation. Come ready with your questions for the panel!

PROTECT 2019