General Sessions

Proofpoint Welcome Keynote with Gary Steele, CEO Risky Business Live

Proofpoint Welcome Keynote with Gary Steele, CEO

Gary Steele, CEO, Proofpoint

Risky Business Live - CISO Panel

Helen Patton, Chief Information Security Officer, The Ohio State University
Sheldon Cuffie, VP and Enterprise CISO, American Family Insurance
Patrick Gray, Risky.Biz

Watch now Watch now
   
Risky Business Live The Best Defense: A Brief History of Red vs. Blue in Information Security, and Where We Go from Here

Risky Business Live - Threat Research Session

Patrick Gray, Risky.Biz
Sherrod DeGrippo, Sr. Director of Threat Research and Detection, Proofpoint

The Best Defense: A Brief History of Red vs. Blue in
Information Security, and Where We Go from Here

Ryan Kalember, EVP, Cybersecurity Strategy, Proofpoint

Watch now Watch now
   
A Face in the Cloud: Tracking the Evolution of People-Targeted Threats  

A Face in the Cloud: Tracking the Evolution of
People-Targeted Threats

Chris Lockery, Deputy CISO, Cigna
Ryan Kalember, Executive VP, Cybersecurity Strategy, Proofpoint

 
Watch now  
   

Email Security

A Blueprint to Defend Against Business Email Compromise (BEC) and Email Account Compromise (EAC)

BEC and EAC have cost organizations $26B over a three-year-period. How can your organization best protect itself against these costly threats? Join this Proofpoint customer session to hear about strategies, best practices and lessons learned to defend against BEC and EAC.

Speakers:

Brian Uhreen, Manager Security Operations, Finning International
Sara Pan, Senior Product Marketing Manager, Proofpoint

Learn More

Best Practices: Implementing DMARC for Inbound Email

Many organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security.

Speakers:

Rob Fleming, Principal Consultant, Proofpoint
Christophe Wolfhugel, Principal Consultant, Proofpoint

Learn More

Best Practices: Office 365 with Proofpoint

As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

Speakers:

Michael Beninda, Director of Professional Services, Proofpoint
James Knight, Principal Consultant, Proofpoint

Learn More

Best Practices: Preventing Business Email Compromise and Email Account Compromise

Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC.

Speakers:

Jessica Greer, Director of Professional Services, Proofpoint
Mike Olden, Principal Consultant, Proofpoint

Learn More

Leverage VAPs as a Blueprint to Apply Adaptive Controls

In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks.

Speaker:

Brett Shaw, Sr. Product Marketing Manager, Proofpoint
Neko Papez, Product Marketing Manager, Proofpoint
Gary Hayslip, CISO, Softbank Investment Advisors

Learn More

Reducing Phishing Attacks and Operational Costs through Automation

With email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

Speakers:

Grover Newborn, Sr. Security Engineer, CoStar
Tanner Luxner, Product Marketing Manager, Proofpoint

Learn More

Stopping Identity Deception with DMARC

Identity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC.

Speakers:

Jason Carter, IT Manager, Florida State University
Tanner Luxner, Product Marketing Manager, Proofpoint

Learn More

Threat Actors' New Blueprint: Combining Email and Cloud Threats

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

Chris Iezzoni, Field Intelligence Director, Proofpoint
Roie Cohen Duwek, Director of Security Research, Proofpoint

Learn More

Cloud Security

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

Speakers:

Justin Collins, Senior Director of Professional Services, Proofpoint
Jessica Greer, Director of Professional Services, Proofpoint

Learn More

Best Practices: Governing third-party OAuth apps and scripts

If you are looking for a framework to governing third-party OAuth apps and reducing your attack surface, look no further than Proofpoint CASB. In this workshop, you will learn how to defend against malicious apps, evaluate new authorizations and existing apps for risk and define app governance policies.

Speakers:

Izak Karmona, Principal Consultant, Proofpoint
Nikos Nikolaou, Director of Professional Services, Proofpoint

Learn More

Best Practices: Office 365 Security with Proofpoint

As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

Speakers:

Michael Beninda, Principal Consultant - Professional Services, Proofpoint
James Knight, Principal Consultant - Professional Services, Proofpoint

Learn More

Deploying Zero Trust with Proofpoint

Zero trust is a term that is being used broadly, but what does it really mean? And what does it take for an organization to adopt a zero trust architecture? For many, starting the deployment of zero trust technology can be quick - see how Proofpoint can start you on your journey.

Speakers:

Yacov (Jack) Kotev, Security Engineer, Outbrain
Kobi Seviliya, Director of Global IT, Outbrain
Chen Nisnkorn,Sr. Director, Technical Sales, Proofpoint Eric Schwake, Sr. Manager, Product Marketing, Proofpoint

Learn More

Leverage VAPs and Cloud Insights as a Blueprint to Apply Adaptive Controls

In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) Intelligence and cloud threat insights as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how to deploy solutions for better protection against future attacks.

Speakers:

Gary Haysli, CISO, Softbank Investment Advisors
Brett Shaw, Sr. Product Marketing Manager, Proofpoint
Neko Papez, Product Marketing Manager, Proofpoint

Learn More

Protecting Your Cloud Data with Proofpoint CASB

With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

Speakers:

Brian Tschinkel, CISO, Higher Education
Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
Itir Clarke, Sr. Product Marketing Manager, Proofpoint

Learn More

Technology Strategies to Better Secure the All-Remote Enterprise

The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

Speakers:

Lucia Milica, Resident CISO, Proofpoint
John Checco, Resident CISO, Proofpoint

Learn More

Threat Actors' New Blueprint: Combining Email and Cloud Threats

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

Chris Iezzoni, Field Intelligence Director, Proofpoint
Roie Cohen Duwek, Director of Security Research, Proofpoint

Learn More

Information Protection

Best Practices: Building an Information Protection Program

Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.

Speakers:

Justin Collins, Senior Director of Professional Services, Proofpoint
Matt Lyle, Professional Services Architect, Proofpoint

Learn More

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

Speakers:

Justin Collins, Senior Director of Professional Services, Proofpoint
Jessica Greer, Director of Professional Services, Proofpoint

Learn More

Best Practices: Office 365 Security with Proofpoint

As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

Speakers:

Michael Beninda, Principal Consultant - Professional Services, Proofpoint
James Knight, Principal Consultant - Professional Services, Proofpoint

Learn More

Deep Dive: The Future of People-Centric Information Protection

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

Tim Choi, VP, Product Marketing, Proofpoint
Alex Kremer, VP, Chief Architect, Proofpoint

Learn More

Introducing the Next Generation of People-Centric Insider Threat Management Technology

Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

Speaker:

Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint

Learn More

Modern Approaches to Information Protection, Privacy and Cloud Security

DLP and CASB are two of the most frustrating technologies on the market, yet every organization needs to implement cloud security and protect their data. Join us for this interactive session to learn about more modern approaches to these challenges.

Speakers:

Lucia Milica, Global Resident CISO, Proofpoint
Mike Stacy, Sr. Director of Advanced Technologies, Proofpoint

Learn More

Protecting Your Cloud Data with Proofpoint CASB

With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

Speakers:

Brian Tschinkel, CISO, Higher Education
Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
Itir Clarke, Sr. Product Marketing Manager, Proofpoint

Learn More

The New Blue Print: The Future of People-Centric Information Protection

A people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy for Enterprise DLP and Insider Threat Management. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era.

Speakers:

David Knight, EVP and GM of Cloud Security Group, Proofpoint
Mayank Choudhary, SVP of Product, Insider Threat Management, Proofpoint

Learn More

Panel discussion: The Evolution of the Insider Threat

Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutions related to insider threat management.

Speakers:

Stacey Champagne, Insider Threat Investigations Lead, PayPal
Gary Hayslip, CISO, Softbank Investment Advisors
Rob Oden, Cybersecurity Architect, L3 Harris
Mike McKee, EVP and GM for Insider Threat Management, Proofpoint

Learn More

Practitioner Strategies for the Work From Home Enterprise

The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint customers sharing their stories and strategies related to their experience adapting to the new normal of work from home.

Speakers:

Matt Lyle, Professional Services Architect, Proofpoint
Mike Olden, Principal Consultant, Proofpoint

Learn More

Technology Strategies to Better Secure the All-Remote Enterprise

The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

Speakers:

Lucia Milica, Global Resident CISO, Proofpoint
J.C. Checco, Resident CISO, Proofpoint

Learn More

Modern Compliance

2020 In Review: Learnings for Compliance Leaders

The global pandemic has forced people across demographics to make drastic lifestyle changes overnight. Similarly, businesses and organizations have had to adapt and align policies to the ""new normal"" brought on by travel restrictions and mostly remote workforces. Join us for an informative breakout where our customer panel will share what they've learned during the turbulent first half of 2020.

We'll ask them:

  • How shelter-in-place orders and other restrictions impacted their compliance teams
  • What parts of their processes and programs have they had to change
  • What long-term changes they anticipate making in response to their learnings

Speakers:

Suzanne La Roque, Compliance IT Transformation Strategy Director, Pacific Life
Melanie Taylor, SVP Compliance, LPL Financial
Amanda Anderson, Product Marketing Manager, Proofpoint

Learn More

Augmenting Microsoft 365 Solutions with Proofpoint Capture & Archiving

No single vendor can be everything to everyone. Not Microsoft. Not even Proofpoint. And when it comes to archiving and compliance initiatives, there are compelling reasons to augment Office 365 (now Microsoft 365) with Proofpoint Enterprise Archive and Proofpoint Content Capture. Attend this session to learn some of the significant ways Proofpoint can help your organization when it comes to capturing a wide array of content for compliance initiatives and storing it long-term to meet your business and regulatory information retention requirements.

Join us for insights on:

  • The best methods for capturing Microsoft email and Teams communications
  • How much easier to use Proofpoint e-discovery technology is than the Microsoft features you’ve implemented or are considering
  • How to mitigate communications risks for regulatory and internal compliance purposes with Enterprise Archive and Proofpoint Intelligent Supervision

Speakers:

Shawn Aquino, Senior Product Marketing Manager, Proofpoint
Terry McMahon, Senior Systems Engineer, Proofpoint

Learn More

Best Practices for Balancing Risk and Reward with Social Media and Digital Communications

New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.

In this session, you'll learn:

  • Important considerations for how you capture and manage communications data
  • How to scale supervision of public-facing channels
  • How to avoid common pitfalls and roadblocks

Speakers:

Natasha Richards, VP Professional Services, Grapevine6
Amanda Anderson, Product Marketing Manager, Proofpoint

Learn More

Best Practices for Balancing Risk and Reward with Social Media and Digital Communications - EMEA

New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.

In this session, you'll learn:

  • Important considerations for how you capture and manage communications data
  • How to scale supervision of public-facing channels
  • How to avoid common pitfalls and roadblocks

Speakers:

Ian Healey, Partner Marketing Manager, EMEA, Hootsuite
Michael McGrath, Sr. Director Compliance & Digital Risk, Proofpoint

Learn More

People-Centric Compliance for your Digital Transformation Journey

Proofpoint Compliance's vision for the next 1 - 3 years; covering market trends, challenges, and help guide customers on where best to place their compliance investments within an end-to-end technology stack that is or will be going through digital transformation.

Speaker:

Darren Lee, EVP & GM of Compliance and Archiving, Proofpoint

Learn More

Simplify Your Legacy Data Migration Strategy with Ease

As data migration size increases from Terabytes to Petabytes, imports include more than just messages, coupled with speed expectations and compliance needs has required PFPT to innovate and automate. This session will go into how we have adapted to this need and what we have done.

Speakers:

Thalli Badrinath, Senior Director of Professional Services, Proofpoint
Mark DiGiovanni, Senior Director of Professional Services, Proofpoint

Learn More

Tech Session: How to Mitigate Compliance Risk with Intelligent Supervision

Businesses are becoming aware of the need to monitor employee communications and mitigate risk associated with electronic communications. Once the domain for primarily financial services organizations, supervision technology now extends to many other vertical markets and industries. Discover the latest approach to protect your organization from legal, regulatory, and reputational risk.

Join us to learn insights on:

  • What does a Compliance Risk Mitigation program look like and why is it critical for your organization, including trends driving adoption
  • How Proofpoint can help you implement your Compliance Risk Mitigation program
  • What best practices can be shared through learnings from customers who’ve started their journey

Speakers:

Rick Dales, VP, Product Management, Proofpoint
John Pepe, Market Development Principal of Financial Services, Proofpoint

Learn More

Tech Session: Proofpoint E-Discovery - Everything You Need for Investigations

Proofpoint Enterprise Archive already has plenty of great e-discovery features to help you search your data in seconds, preserve what you need to, and export data as needed for outside review. But we've added a whole host of new features to refine what you're searching for. In this session, Proofpoint experts will focus on how to leverage these new features and highlight how to better use some of the existing tools.

Join us to learn:

  • How Proofpoint delivers on its industry-leading SLA through blazing fast search performance, coupled with flexible filtering and options for managing results
  • How ease-of-use is built into our e-discovery workflow, empowering non-technical users for self-service through a unified user experience from basic through advanced capabilities
  • How advanced features enable you to perform more analysis, processing and culling in house, helping reduce related costs

Speakers:

Dave Ely, Director of Product Management, Proofpoint
Davin Stilson, Manager of Sales Engineering, Proofpoint

Learn More

Why Intelligence Matters when Addressing Your Pressing E-Discovery and Supervision Challenges

An "intelligent solution can certainly leverage machine learning or artificial intelligence. At Proofpoint, however, we see intelligence" as a trifecta that spans Detection, Automation, and Visualization in features that help improve efficiency, reduce costs and more. In this session, we’ll peer into specific ways Proofpoint has woven intelligent innovations into its archiving technology to solve real customer challenges.

Join us for insights on:

  • Using Intelligent Supervision and features such as Compliance Risk Dashboard and Review Sets to detect inappropriate behavior
  • Using automation through Technology Assisted Review in-house to help reduce costs and improve accuracy
  • Using advanced e-discovery features for enhanced visualization to better understand the nature of the data you have

Speakers:

Shawn Aquino, Senior Product Marketing Manager, Proofpoint
Terry McMahon, Senior Systems Engineer, Proofpoint

Learn More

Security Awareness Training

Building a Successful Security Awareness Month Campaign

Do you find yourself scrambling to put together a plan for Cyber Security Awareness Month in October? We will walk you through a new offering, Campaigns, where we outline timelines, engagement ideas, internal communication resources and content to help you deliver a successful program.

Speakers:

Susan Mackowiak, Sr. Director of Program Content, Proofpoint
Gretel Egan, Sr. Security Awareness and Training Strategist of CSAP, Proofpoint

Learn More

Customer Story: Graduating Good Cyber Citizens

Saint Louis University started with Proofpoint's technology to reduce IT overhead and exposure to phishing attacks. Learn from their CISO Rebecca Harness how they're educating and empowering their diverse groups of users to be a strong line of defense using Proofpoint Security Awareness Training.

Speakers:

Rebecca Harness, CISO, St. Louis University
Mark Guntrip, Director of Product Marketing, Proofpoint

Learn More

How integrating threat intelligence translates into a superior security awareness program

Proofpoint threat intelligence, as well as offering valuable insight into how attackers are targeting people can add significant value to a security awareness program. Learn how Proofpoint obtains visibility and translates it into value for your program.

Speaker:

Mark Guntrip, Director, Product Marketing, Proofpoint

Learn More

Implementing a people-centric, data driven security awareness programme

We cannot secure behaviour so we need our employees to behave securely. For a long time awareness campaigns have been focused on sending the same message at the same time to all employees. But people are different — they are targeted differently, behave differently, are incentivised and triggered by different things. Companies can no longer rely on surveys and e-learnings alone to change behaviour. We need to tailor our awareness efforts for each employee. In this session we will walk through how by giving each employee the right training at the right time, ABN AMRO makes the organisation more cyber resilient.

Speakers:

Richard Verbrugge, Information Security Awareness Manager, ABN Amro
Paul Down, Senior Director, Security Awareness Training, EMEA, Proofpoint

Learn More

Security Awareness Training: One CISO’s Journey from "Doubter to Believer”

Hear from a former Fortune 500 CISO, Alan Levine about how he didn’t believe in security awareness training — until a nation-state attack on his organization revealed the value of including users in a defense-in-depth strategy.

Speakers:

Alan Levine, CISO Advisor
Roie Cohen Duwek, Director of Security Research, Proofpoint

Learn More

CISO / Leadership

An Overdue Shift to People-Centric Security

The forces of digital transformation are reshaping work and cyber trends at light speed. This session will explain why the shift to people-centric security is relevant, urgent, and long overdue. We will introduce a new framework with practical guidance for CISOs to implement and evolve their strategy.

Speakers:

Lucia Milica, Global Resident CISO, Proofpoint
Sherrod DeGrippo, Senior Director of Threat Research and Detection, Proofpoint

Learn More

BEC Attacks in Academia – Who’s Impersonating Whom?

The 2020 Verizon DBIR cited BEC as one of the most problematic attack types in academia. This session features a presentation and panel discussion that outlines who cybercriminals are targeting in teaching institutions, the most impactful lures being deployed, and tactics to thwart the bad actors.

Speakers:

Michael Duff, AVP & CISO, Stanford University
Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint

Learn More

Introducing Nexus People Risk Explorer

Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.

Speakers:

Julie Sutton, Information Security Manager, City and County of Denver
Chris White, CISO, IPG
Jenn Cheng, Director, Product Marketing, Proofpoint

Learn More

Mitigating Risk in a Distributed Workforce

While it would have been nice if threat actors had taken a break during the initial COVID lockdowns, what we actually saw was a significant increase in cyber attacks -- particularly social engineering attacks, such as phishing. As this 'new normal' continues to evolve, businesses need a way to mitigate these attacks and protect their increasingly distributed workforce.

In this session, we'll talk through the role of risk-based authentication in modern, zero trust security as well as how integrations across security technologies, such as with Proofpoint, Okta + CrowdStrike, can enhance security and also productivity -- wherever your workers are, and whatever tools they're using.

Speaker:

Kelsey Nelson, Senior Product Marketing Manager, Okta

Learn More

People-Centric Security from a Government Perspective

Government organizations have unique drivers and compliance requirements. This session will focus on how a people-centric approach can help government organizations make more progress against protecting systems, networks, and people from those who wish to do them harm.

Speakers:

Dean Johnson, COO, Georgia Technology Authority
Mike Baker, CISO, GDIT
Bruce Brody, Resident CISO, Proofpoint

Learn More

Predictions Beyond 2020 for Financial Services: “What a Long Strange Trip It’s Been” (Grateful Dead)

Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

Attend this session to learn about:

  • The ransomware cyber threat landscape
  • Using strategic, operational and tactical assessments to shine lights on points of exposure
  • How technical knowledge, intel, threat hunting and partners can help pave the way forward
  • Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint

Speakers:

J.C. Checco, Resident CISO, Proofpoint
Sean O'Dowd, Global Financial Services Director, Proofpoint

Learn More

Protecting Healthcare From Cyberattacks During a Pandemic and Beyond

This past year, Proofpoint researchers noted a surge in attacks with health-related topics, specifically COVID-19, as the lure of choice.

Join our speakers as they share:

  • Rapid evolution of healthcare-themed phishing
  • Research on the most attacked healthcare job functions
  • Controls and strategies to protect your people and patients

Speakers:

Jason Powell, CISO, Brookdale Senior Living
Frank Wazsmer, CISO, Prisma Health
Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint

Learn More

Protecting Your Health System from BEC Attacks

Cybercriminals today are targeting health systems using fraudulent emails to clinical staff, administrators, and business associates within the supply chain. In this panel, we’ll hear more about these frighteningly effective attacks and learn how to empower your people to know a legitimate request from a con.

Speakers:

Justin Stover, CISO, Select Medical
Chris Baldwin, CISO, Hartford Health
Ryan Witt, Managing Director, Healthcare and Education, Proofpoint

Learn More

Speaking Your CFO's Language

Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.

Speakers:

Paul Auvil, Chief Financial Officer, Proofpoint
Lucia Milica, Global Resident CISO, Proofpoint

Learn More

Strategies for Engaging with Your Board of Directors

Today’s CISOs must answer to the business and the board. Benchmarks, maturity models, and frameworks help facilitate those conversations. This session will share such strategies, tools, and data to help you build your next presentation and guarantee the attention of your company board.

Speakers:

Lucia Milica, Global Resident CISO, Proofpoint
Andrew Rose, Resident CISO - EMEA, Proofpoint

Learn More

Technology Strategies to Better Secure the All-Remote Enterprise

The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

Speakers:

Lucia Milica, Global Resident CISO, Proofpoint
J.C. Checco, Resident CISO, Proofpoint

Learn More

Threat Intelligence Observations for 2020 and Beyond

Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

Attend this session to learn about:

  • The ransomware cyber threat landscape
  • Using strategic, operational and tactical assessments to shine lights on points of exposure
  • How technical knowledge, intel, threat hunting and partners can help pave the way forward
  • Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint

Speaker:

Josh Burgess, Lead Technical Strategic Advisor, CrowdStrike

Learn More

Email Security

A Blueprint to Defend Against Business Email Compromise (BEC) and Email Account Compromise (EAC)

BEC and EAC have cost organizations $26B over a three-year-period. How can your organization best protect itself against these costly threats? Join this Proofpoint customer session to hear about strategies, best practices and lessons learned to defend against BEC and EAC.

Speakers:

  • Brian Uhreen, Manager Security Operations, Finning International
  • Sara Pan, Senior Product Marketing Manager, Proofpoint

Learn More

Best Practices: Implementing DMARC for Inbound Email

Many organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security.

Speakers:

  • Rob Fleming, Principal Consultant, Proofpoint
  • Christophe Wolfhugel, Principal Consultant, Proofpoint

Learn More

Best Practices: Office 365 with Proofpoint

As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

Speakers:

  • Michael Beninda, Director of Professional Services, Proofpoint
  • James Knight, Principal Consultant, Proofpoint

Learn More

Best Practices: Preventing Business Email Compromise and Email Account Compromise

Whether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC.

Speakers:

  • Jessica Greer, Director of Professional Services, Proofpoint
  • Mike Olden, Principal Consultant, Proofpoint

Learn More

Leverage VAPs as a Blueprint to Apply Adaptive Controls

In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks.

Speaker:

  • Brett Shaw, Sr. Product Marketing Manager, Proofpoint
  • Neko Papez, Product Marketing Manager, Proofpoint
  • Gary Hayslip, CISO, Softbank Investment Advisors

Learn More

Reducing Phishing Attacks and Operational Costs through Automation

With email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work.

Speakers:

  • Grover Newborn, Sr. Security Engineer, CoStar
  • Tanner Luxner, Product Marketing Manager, Proofpoint

Learn More

Stopping Identity Deception with DMARC

Identity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC.

Speakers:

  • Jason Carter, IT Manager, Florida State University
  • Tanner Luxner, Product Marketing Manager, Proofpoint

Learn More

Threat Actors' New Blueprint: Combining Email and Cloud Threats

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

  • Chris Iezzoni, Field Intelligence Director, Proofpoint
  • Roie Cohen Duwek, Director of Security Research, Proofpoint

Learn More

Cloud Security

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

Speakers:

  • Justin Collins, Senior Director of Professional Services, Proofpoint
  • Jessica Greer, Director of Professional Services, Proofpoint

Learn More

Best Practices: Governing third-party OAuth apps and scripts

If you are looking for a framework to governing third-party OAuth apps and reducing your attack surface, look no further than Proofpoint CASB. In this workshop, you will learn how to defend against malicious apps, evaluate new authorizations and existing apps for risk and define app governance policies.

Speakers:

  • Izak Karmona, Principal Consultant, Proofpoint
  • Nikos Nikolaou, Director of Professional Services, Proofpoint

Learn More

Best Practices: Office 365 Security with Proofpoint

As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

Speakers:

  • Michael Beninda, Principal Consultant - Professional Services, Proofpoint
  • James Knight, Principal Consultant - Professional Services, Proofpoint

Learn More

Deploying Zero Trust with Proofpoint

Zero trust is a term that is being used broadly, but what does it really mean? And what does it take for an organization to adopt a zero trust architecture? For many, starting the deployment of zero trust technology can be quick - see how Proofpoint can start you on your journey.

Speakers:

  • Yacov (Jack) Kotev, Security Engineer, Outbrain
  • Kobi Seviliya, Director of Global IT, Outbrain
  • Chen Nisnkorn,Sr. Director, Technical Sales, Proofpoint
  • Eric Schwake, Sr. Manager, Product Marketing, Proofpoint

Learn More

Leverage VAPs and Cloud Insights as a Blueprint to Apply Adaptive Controls

In this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) Intelligence and cloud threat insights as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how to deploy solutions for better protection against future attacks.

Speakers:

  • Gary Haysli, CISO, Softbank Investment Advisors
  • Brett Shaw, Sr. Product Marketing Manager, Proofpoint
  • Neko Papez, Product Marketing Manager, Proofpoint

Learn More

Protecting Your Cloud Data with Proofpoint CASB

With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

Speakers:

  • Brian Tschinkel, CISO, Higher Education
  • Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
  • Itir Clarke, Sr. Product Marketing Manager, Proofpoint

Learn More

Technology Strategies to Better Secure the All-Remote Enterprise

The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

Speakers:

  • Lucia Milica, Resident CISO, Proofpoint
  • John Checco, Resident CISO, Proofpoint

Learn More

Threat Actors' New Blueprint: Combining Email and Cloud Threats

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

  • Chris Iezzoni, Field Intelligence Director, Proofpoint
  • Roie Cohen Duwek, Director of Security Research, Proofpoint

Learn More

Information Protection

Best Practices: Building an Information Protection Program

Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.

Speakers:

  • Justin Collins, Senior Director of Professional Services, Proofpoint
  • Matt Lyle, Professional Services Architect, Proofpoint

Learn More

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

Speakers:

  • Justin Collins, Senior Director of Professional Services, Proofpoint
  • Jessica Greer, Director of Professional Services, Proofpoint

Learn More

Best Practices: Office 365 Security with Proofpoint

As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

Speakers:

  • Michael Beninda, Principal Consultant - Professional Services, Proofpoint
  • James Knight, Principal Consultant - Professional Services, Proofpoint

Learn More

Deep Dive: The Future of People-Centric Information Protection

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

  • Tim Choi, VP, Product Marketing, Proofpoint
  • Alex Kremer, VP, Chief Architect, Proofpoint

Learn More

Modern Approaches to Information Protection, Privacy and Cloud Security

DLP and CASB are two of the most frustrating technologies on the market, yet every organization needs to implement cloud security and protect their data. Join us for this interactive session to learn about more modern approaches to these challenges.

Speakers:

  • Lucia Milica, Global Resident CISO, Proofpoint
  • Mike Stacy, Sr. Director of Advanced Technologies, Proofpoint

Learn More

Introducing the Next Generation of People-Centric Insider Threat Management Technology

Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

Speaker:

  • Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint

Learn More

Panel discussion: The Evolution of the Insider Threat

Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutions related to insider threat management.

Speakers:

  • Stacey Champagne, Insider Threat Investigations Lead, PayPal
  • Gary Hayslip, CISO, Softbank Investment Advisors
  • Rob Oden, Cybersecurity Architect, L3 Harris
  • Mike McKee, EVP and GM for Insider Threat Management, Proofpoint

Learn More

Practitioner Strategies for the Work From Home Enterprise

The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint customers sharing their stories and strategies related to their experience adapting to the new normal of work from home.

Speakers:

  • Matt Lyle, Professional Services Architect, Proofpoint
  • Mike Olden, Principal Consultant, Proofpoint

Learn More

Protecting Your Cloud Data with Proofpoint CASB

With migration to the cloud, the same is taking place for an organization's data to realize cost savings and enable productivity. However, the threat against an organization's valuable data persists. In this session, come and learn how a Proofpoint customer is defending their organization's data in the cloud with Proofpoint CASB.

Speakers:

  • Brian Tschinkel, CISO, Higher Education
  • Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
  • Itir Clarke, Sr. Product Marketing Manager, Proofpoint

Learn More

Technology Strategies to Better Secure the All-Remote Enterprise

The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

Speakers:

  • Lucia Milica, Global Resident CISO, Proofpoint
  • J.C. Checco, Resident CISO, Proofpoint

Learn More

The New Blue Print: The Future of People-Centric Information Protection

A people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy for Enterprise DLP and Insider Threat Management. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era.

Speakers:

  • David Knight, EVP and GM of Cloud Security Group, Proofpoint
  • Mayank Choudhary, SVP of Product, Insider Threat Management, Proofpoint

Learn More

Modern Compliance

2020 In Review: Learnings for Compliance Leaders

The global pandemic has forced people across demographics to make drastic lifestyle changes overnight. Similarly, businesses and organizations have had to adapt and align policies to the ""new normal"" brought on by travel restrictions and mostly remote workforces. Join us for an informative breakout where our customer panel will share what they've learned during the turbulent first half of 2020.

We'll ask them:

  • How shelter-in-place orders and other restrictions impacted their compliance teams
  • What parts of their processes and programs have they had to change
  • What long-term changes they anticipate making in response to their learnings

Speakers:

  • Suzanne La Roque, Compliance IT Transformation Strategy Director, Pacific Life
  • Melanie Taylor, SVP Compliance, LPL Financial
  • Amanda Anderson, Product Marketing Manager, Proofpoint

Learn More

Augmenting Microsoft 365 Solutions with Proofpoint Capture & Archiving

No single vendor can be everything to everyone. Not Microsoft. Not even Proofpoint. And when it comes to archiving and compliance initiatives, there are compelling reasons to augment Office 365 (now Microsoft 365) with Proofpoint Enterprise Archive and Proofpoint Content Capture. Attend this session to learn some of the significant ways Proofpoint can help your organization when it comes to capturing a wide array of content for compliance initiatives and storing it long-term to meet your business and regulatory information retention requirements.

Join us for insights on:

  • The best methods for capturing Microsoft email and Teams communications
  • How much easier to use Proofpoint e-discovery technology is than the Microsoft features you’ve implemented or are considering
  • How to mitigate communications risks for regulatory and internal compliance purposes with Enterprise Archive and Proofpoint Intelligent Supervision

Speakers:

  • Shawn Aquino, Senior Product Marketing Manager, Proofpoint
  • Terry McMahon, Senior Systems Engineer, Proofpoint

Learn More

Best Practices for Balancing Risk and Reward with Social Media and Digital Communications

New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.

In this session, you'll learn:

  • Important considerations for how you capture and manage communications data
  • How to scale supervision of public-facing channels
  • How to avoid common pitfalls and roadblocks

Speakers:

  • Natasha Richards, VP Professional Services, Grapevine6
  • Amanda Anderson, Product Marketing Manager, Proofpoint

Learn More

Best Practices for Balancing Risk and Reward with Social Media and Digital Communications — EMEA

New tools for business communications continue to enter the scene at an unrelenting pace and transform the way we work. From enterprise chat applications to social media, employees and client connections are increasingly digital. At many companies, the complexities of this transformation can leave security and IT teams with a major headache. In regulated industries, the headache extends to legal and compliance teams, who need to ensure that all business communications comply with record-keeping and supervision rules. Join us to learn real-life strategies for staying compliant as you roll out digital communications platforms.

In this session, you'll learn:

  • Important considerations for how you capture and manage communications data
  • How to scale supervision of public-facing channels
  • How to avoid common pitfalls and roadblocks

Speakers:

  • Ian Healey, Partner Marketing Manager, EMEA, Hootsuite
  • Michael McGrath, Sr. Director Compliance & Digital Risk, Proofpoint

Learn More

People-Centric Compliance for your Digital Transformation Journey

Proofpoint Compliance's vision for the next 1 - 3 years; covering market trends, challenges, and help guide customers on where best to place their compliance investments within an end-to-end technology stack that is or will be going through digital transformation.

Speaker:

  • Darren Lee, EVP & GM of Compliance and Archiving, Proofpoint

Learn More

Simplify Your Legacy Data Migration Strategy with Ease

As data migration size increases from Terabytes to Petabytes, imports include more than just messages, coupled with speed expectations and compliance needs has required PFPT to innovate and automate. This session will go into how we have adapted to this need and what we have done.

Speakers:

  • Thalli Badrinath, Senior Director of Professional Services, Proofpoint
  • Mark DiGiovanni, Senior Director of Professional Services, Proofpoint

Learn More

Tech Session: How to Mitigate Compliance Risk with Intelligent Supervision

Businesses are becoming aware of the need to monitor employee communications and mitigate risk associated with electronic communications. Once the domain for primarily financial services organizations, supervision technology now extends to many other vertical markets and industries. Discover the latest approach to protect your organization from legal, regulatory, and reputational risk.

Join us to learn insights on:

  • What does a Compliance Risk Mitigation program look like and why is it critical for your organization, including trends driving adoption
  • How Proofpoint can help you implement your Compliance Risk Mitigation program
  • What best practices can be shared through learnings from customers who’ve started their journey

Speakers:

  • Rick Dales, VP, Product Management, Proofpoint
  • John Pepe, Market Development Principal of Financial Services, Proofpoint

Learn More

Tech Session: Proofpoint E-Discovery - Everything You Need for Investigations

Proofpoint Enterprise Archive already has plenty of great e-discovery features to help you search your data in seconds, preserve what you need to, and export data as needed for outside review. But we've added a whole host of new features to refine what you're searching for. In this session, Proofpoint experts will focus on how to leverage these new features and highlight how to better use some of the existing tools.

Join us to learn:

  • How Proofpoint delivers on its industry-leading SLA through blazing fast search performance, coupled with flexible filtering and options for managing results
  • How ease-of-use is built into our e-discovery workflow, empowering non-technical users for self-service through a unified user experience from basic through advanced capabilities
  • How advanced features enable you to perform more analysis, processing and culling in house, helping reduce related costs

Speakers:

  • Dave Ely, Director of Product Management, Proofpoint
  • Davin Stilson, Manager of Sales Engineering, Proofpoint

Learn More

Why Intelligence Matters when Addressing Your Pressing E-Discovery and Supervision Challenges

An "intelligent solution can certainly leverage machine learning or artificial intelligence. At Proofpoint, however, we see intelligence" as a trifecta that spans Detection, Automation, and Visualization in features that help improve efficiency, reduce costs and more. In this session, we’ll peer into specific ways Proofpoint has woven intelligent innovations into its archiving technology to solve real customer challenges.

Join us for insights on:

  • Using Intelligent Supervision and features such as Compliance Risk Dashboard and Review Sets to detect inappropriate behavior
  • Using automation through Technology Assisted Review in-house to help reduce costs and improve accuracy
  • Using advanced e-discovery features for enhanced visualization to better understand the nature of the data you have

Speakers:

  • Shawn Aquino, Senior Product Marketing Manager, Proofpoint
  • Terry McMahon, Senior Systems Engineer, Proofpoint

Learn More

Security Awareness Training

Building a Successful Security Awareness Month Campaign

Do you find yourself scrambling to put together a plan for Cyber Security Awareness Month in October? We will walk you through a new offering, Campaigns, where we outline timelines, engagement ideas, internal communication resources and content to help you deliver a successful program.

Speakers:

  • Susan Mackowiak, Sr. Director of Program Content, Proofpoint
  • Gretel Egan, Sr. Security Awareness and Training Strategist of CSAP, Proofpoint

Learn More

Customer Story: Graduating Good Cyber Citizens

Saint Louis University started with Proofpoint's technology to reduce IT overhead and exposure to phishing attacks. Learn from their CISO Rebecca Harness how they're educating and empowering their diverse groups of users to be a strong line of defense using Proofpoint Security Awareness Training.

Speakers:

  • Rebecca Harness, CISO, St. Louis University
  • Mark Guntrip, Director of Product Marketing, Proofpoint

Learn More

How integrating threat intelligence translates into a superior security awareness program

Proofpoint threat intelligence, as well as offering valuable insight into how attackers are targeting people can add significant value to a security awareness program. Learn how Proofpoint obtains visibility and translates it into value for your program.

Speaker:

  • Mark Guntrip, Director, Product Marketing, Proofpoint

Learn More

Implementing a people-centric, data driven security awareness programme

We cannot secure behaviour so we need our employees to behave securely. For a long time awareness campaigns have been focused on sending the same message at the same time to all employees. But people are different — they are targeted differently, behave differently, are incentivised and triggered by different things. Companies can no longer rely on surveys and e-learnings alone to change behaviour. We need to tailor our awareness efforts for each employee. In this session we will walk through how by giving each employee the right training at the right time, ABN AMRO makes the organisation more cyber resilient.

Speakers:

  • Richard Verbrugge, Information Security Awareness Manager, ABN Amro
  • Paul Down, Senior Director, Security Awareness Training, EMEA, Proofpoint

Learn More

Security Awareness Training: One CISO’s Journey from "Doubter to Believer”

Hear from a former Fortune 500 CISO, Alan Levine about how he didn’t believe in security awareness training — until a nation-state attack on his organization revealed the value of including users in a defense-in-depth strategy.

Speakers:

  • Alan Levine, CISO Advisor
  • Roie Cohen Duwek, Director of Security Research, Proofpoint

Learn More

CISO / Leadership

An Overdue Shift to People-Centric Security

The forces of digital transformation are reshaping work and cyber trends at light speed. This session will explain why the shift to people-centric security is relevant, urgent, and long overdue. We will introduce a new framework with practical guidance for CISOs to implement and evolve their strategy.

Speakers:

  • Lucia Milica, Global Resident CISO, Proofpoint
  • Sherrod DeGrippo, Senior Director of Threat Research and Detection, Proofpoint

Learn More

BEC Attacks in Academia – Who’s Impersonating Whom?

The 2020 Verizon DBIR cited BEC as one of the most problematic attack types in academia. This session features a presentation and panel discussion that outlines who cybercriminals are targeting in teaching institutions, the most impactful lures being deployed, and tactics to thwart the bad actors.

Speakers:

  • Michael Duff, AVP & CISO, Stanford University
  • Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint

Learn More

Introducing Nexus People Risk Explorer

Identifying VAPs is the start to mitigating risk from people –but what about behavioral vulnerabilities and access privileges? Be among the first to learn about a new tool to gain a unified view of your people risk. Hear from CISOs who consulted on its design and how it benefits their security programs.

Speakers:

  • Julie Sutton, Information Security Manager, City and County of Denver
  • Chris White, CISO, IPG
  • Jenn Cheng, Director, Product Marketing, Proofpoint

Learn More

Mitigating Risk in a Distributed Workforce

While it would have been nice if threat actors had taken a break during the initial COVID lockdowns, what we actually saw was a significant increase in cyber attacks -- particularly social engineering attacks, such as phishing. As this 'new normal' continues to evolve, businesses need a way to mitigate these attacks and protect their increasingly distributed workforce.

In this session, we'll talk through the role of risk-based authentication in modern, zero trust security as well as how integrations across security technologies, such as with Proofpoint, Okta + CrowdStrike, can enhance security and also productivity -- wherever your workers are, and whatever tools they're using.

Speaker:

  • Kelsey Nelson, Senior Product Marketing Manager, Okta

Learn More

People-Centric Security from a Government Perspective

Government organizations have unique drivers and compliance requirements. This session will focus on how a people-centric approach can help government organizations make more progress against protecting systems, networks, and people from those who wish to do them harm.

Speakers:

  • Dean Johnson, COO, Georgia Technology Authority
  • Mike Baker, CISO, GDIT
  • Bruce Brody, Resident CISO, Proofpoint

Learn More

Predictions Beyond 2020 for Financial Services: “What a Long Strange Trip It’s Been” (Grateful Dead)

Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

Attend this session to learn about:

  • The ransomware cyber threat landscape
  • Using strategic, operational and tactical assessments to shine lights on points of exposure
  • How technical knowledge, intel, threat hunting and partners can help pave the way forward
  • Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint

Speakers:

  • J.C. Checco, Resident CISO, Proofpoint
  • Sean O'Dowd, Global Financial Services Director, Proofpoint

Learn More

Protecting Healthcare From Cyberattacks During a Pandemic and Beyond

This past year, Proofpoint researchers noted a surge in attacks with health-related topics, specifically COVID-19, as the lure of choice.

Join our speakers as they share:

  • Rapid evolution of healthcare-themed phishing
  • Research on the most attacked healthcare job functions
  • Controls and strategies to protect your people and patients

Speakers:

  • Jason Powell, CISO, Brookdale Senior Living
  • Frank Wazsmer, CISO, Prisma Health
  • Ryan Witt, Managing Director of Healthcare Industry Practice, Proofpoint

Learn More

Protecting Your Health System from BEC Attacks

Cybercriminals today are targeting health systems using fraudulent emails to clinical staff, administrators, and business associates within the supply chain. In this panel, we’ll hear more about these frighteningly effective attacks and learn how to empower your people to know a legitimate request from a con.

Speakers:

  • Justin Stover, CISO, Select Medical
  • Chris Baldwin, CISO, Hartford Health
  • Ryan Witt, Managing Director, Healthcare and Education, Proofpoint

Learn More

Speaking Your CFO's Language

Today’s growing economic uncertainty means growing pressure to manage costs and justify spend. In this session, Proofpoint’s CFO and resident CISO will share how to best outpace that pressure, prioritize technology projects, and collaborate to build a robust security program.

Speakers:

  • Paul Auvil, Chief Financial Officer, Proofpoint
  • Lucia Milica, Global Resident CISO, Proofpoint

Learn More

Strategies for Engaging with Your Board of Directors

Today’s CISOs must answer to the business and the board. Benchmarks, maturity models, and frameworks help facilitate those conversations. This session will share such strategies, tools, and data to help you build your next presentation and guarantee the attention of your company board.

Speakers:

  • Lucia Milica, Global Resident CISO, Proofpoint
  • Andrew Rose, Resident CISO - EMEA, Proofpoint

Learn More

Technology Strategies to Better Secure the All-Remote Enterprise

The rapid shift to remote work puts enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

Speakers:

  • Lucia Milica, Global Resident CISO, Proofpoint
  • J.C. Checco, Resident CISO, Proofpoint

Learn More

Threat Intelligence Observations for 2020 and Beyond

Join CrowdStrike to hear recent intelligence about how threat actors deploy ransomware against various industry targets, as well as how the sophistication of ransomware is continuing to evolve.

Attend this session to learn about:

  • The ransomware cyber threat landscape
  • Using strategic, operational and tactical assessments to shine lights on points of exposure
  • How technical knowledge, intel, threat hunting and partners can help pave the way forward
  • Proofpoint and CrowdStrike combine their visibility and extensive threat detection capabilities to provide unparalleled protection for the user and their endpoint

Speaker:

  • Josh Burgess, Lead Technical Strategic Advisor, CrowdStrike

Learn More

Roadmap Session Information

Interested in a roadmap session, click product roadmap to submit your request or contact sales with other inquires.