Interested in receiving updates about Protect 2022?

Thank you for your interest.

General Sessions

 

Proofpoint Welcome Keynote with Gary Steele, CEO Risky Business Live

Proofpoint Welcome Keynote with Gary Steele, CEO

Gary Steele - Chief Executive Officer, Proofpoint

Risky Business Live

Patrick Gray - Risky.Biz
Paige Adams - Group CISO, Zurich Insurance
David McLeod - VP and CISO, Cox Enterprises
Sherrod DeGrippo - Sr. Director, Threat Research and Detection, Proofpoint

Watch now Watch now
   
Ready for What’s Next: The Proofpoint Roadmap Technology and the Human Factor at the Highest Level of Golf

Ready for What’s Next: The Proofpoint Roadmap

Amol Kulkarni - Chief Product & Engineering Officer, CrowdStrike
Joe Diamond - VP, Enterprise Strategy & Product Marketing, Okta
Ryan Kalember - EVP Cybersecurity Strategy, Proofpoint

Technology and the Human Factor at the Highest Level of Golf

Bryson DeChambeau - US Open Champion
Blake Sallé, Chief Revenue Officer - Proofpoint

Watch now Watch now

Tracks

Information Protection and Cloud Security

Raise the Bar for your Cloud Security: What’s Changed in a "Work from Anywhere" World

The move to remote work and accelerated adoption of cloud applications has many IT security professionals playing catch up to secure their users and applications. In this session, we will cover how Proofpoint’s cloud security technologies including CASB, Isolation, ZTNA and web security are integrated together to provide secure access, stop threats and enforce DLP in today’s work from anywhere world.

Speakers:

David Knight - EVP and GM Cloud Security Group, Proofpoint
Elad Horn - VP Product Management Cloud Security, Proofpoint

Learn More

How to Jump Start a DLP Program

Need to elevate your DLP program to address new use cases? Kicking off a new DLP program? Hear from peers and InteliSecure on effective strategies, common project pitfalls, and actionable advice to navigate these waters and better protect against accidental mistakes, attacks, and insider risk.

Speakers:

Marc Atkinson - CISO, Paychex
Jeff White - Sr. Manager, Better.com
Jeremy Wittkop - Sr. Director Technical Services PCMS, Proofpoint

Learn More

Successful Strategies to Combat Insider Threat and Protect Sensitive Data

Insider threats cost organizations $11.45 million, an increase of 31% in just two years.

Hear from peers how they:

• Established a budget
• Built a program to identify and mitigate insider threats, yet balance user and data privacy
• Evolved from insider threat to insider risk with a platform approach

Speaker:

Robert McIntyre - CISO, Tetrapak
Brian Reed - Product Evangelist, Proofpoint

Learn More

Practitioner’s Session: Tackling Key Use Cases for Cloud Security and Information Protection

Learn best practices to tackle key information use cases in new ways – whether you’re protecting data loss through email, cloud, endpoint, or new vectors such as OAuth. We will show the controls, reporting, and investigative process to help you identify risks from negligent, compromised, and malicious users.

Speakers:

Matt Lyle - Professional Services Architect, Proofpoint
Erich Anderson - Sr. Professional Services Consultant, Proofpoint
Mike Stacy - Global Cloud and Information Protection Director, Proofpoint

Learn More

Threat Protection

Practitioner's Session: Supercharge your Threat Protection Program with Integration

How you integrate the components of your threat protection program can be the difference between a go-kart or a Ferrari. Learn how to configure and use integrations between Targeted Attack Protection, Isolation and Security Awareness Training to supercharge your security program.

Speaker:

Colleen Gaffney - Manager, PSAT Managed Services, Proofpoint
Ted Roberts - Sr. Professional Services Consultant, Proofpoint

Learn More

Strategies for Stopping Business Email Compromise Attacks

Business Email Compromise (BEC) comes in many forms: gift card scams, payroll diversion schemes, supplier invoicing fraud and more. Regardless of the attack type, BEC leads the pack in cybercrime losses – nearly $2B in 2020. Join this customer session to gain insights on how to prevent BEC attacks.

Speakers:

Chris Ard - CISO, Newmont
Arin Tufts - Sr. Security Analyst, Newmont
Sara Pan - Sr. Product Marketing Manager, Proofpoint

Learn More

Best Practices for Preventing Account Takeover

As organizations shift to the cloud, stolen credentials become the new currency for cyber criminals. Credential phishing attacks lead to compromised accounts, which exposes your organization to greater risk. Join this session to learn how a Proofpoint customer is defending against account takeover.

Speakers:

John Tziortzis - Director of Cyber Security and Enterprise Systems, Centennial College
Brett Shaw - Sr. Product Marketing Manager, Proofpoint

Learn More

Practitioner’s Session: Preventing Business Email Compromise and Email Account Compromise

Whether by spoofing an identity (BEC) or stealing a valid identity (EAC), attackers’ use of identity deception is on the rise. Learn actions and configurations you can implement with Proofpoint to protect your people from BEC and EAC.

Speakers:

Mike Olden - Principal Professional Services Consultant, Proofpoint
Mike Beninda - Principal Professional Services Consultant, Proofpoint

Learn More

Compliance

Compliance in a Post-Pandemic World

As the public health landscape changes, employees are going to start returning to offices. Yet the move to remote work has altered the way we work, and many of the repercussions are likely here to stay. Join us and hear how compliance leaders are planning for compliance in the post-pandemic era.

Speakers:

Maria Ringer - VP, WIM Social Media Program Manager, Wells Fargo
Sima Patel - Director of Digital Wealth Management, Merrill Lynch
Jasmine Wu - Director, Product Marketing, Proofpoint

Learn More

The Importance of Properly Handling Meeting Content

Virtual meetings have become a staple of modern business communications. Your employees are likely using Zoom, WebEx, or Microsoft Teams to collaborate. And you’re likely considering how to account for compliance and e-discovery needs when it comes to video & audio content. Join us to learn more!

Speakers:

Tim Anderson - Managing Director, FTI Technology
John Pepe – Resident Chief Compliance and Regulatory Officer, Proofpoint
Davin Stilson – Manager, Sales Engineering, Proofpoint

Learn More

Using NexusAI Machine Learning to Ensure Regulatory Compliance

Reviewing false positives are a pain and burns the hours away! Whether you’re supervising digital communications or not, this session is a must-attend to learn how you can put Proofpoint’s latest AI/ML technology to work for you in helping ensure efficient, more intelligent regulatory compliance.

Speakers:

Rick Dales – Director, Product Marketing, Proofpoint
Dan Rapp – Director, Product Management, Proofpoint

Learn More

Search Your Proofpoint Archive and Receive Results Within Seconds!

Not all archives are created equal. Whether you’re using legacy or modern solutions that can’t keep up, if your IT or Legal teams are struggling to address e-discovery requests, this session is for you. We’ll share e-discovery & compliance research insights and show you how Proofpoint can help.

Speaker:

Julie Jensen, Senior Counsel, Financial Services Industry
Davin Stilson – Manager, Sales Engineering, Proofpoint
Shawn Aquino – Sr. Product Marketing Manager, Proofpoint

Learn More

Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products

Realizing the value of Proofpoint’s Compliance products requires: 1) successful migration, 2) implementation and 3) staying up to date with product features. This session will focus on our implementation methodology covering the do’s, don’ts, and tips learned from real-world scenarios. Do not miss this!

Speakers:

Sara Lints - Sr. Manager Professional Services, Proofpoint
Ray McGrath – Manager, Professional Services, Proofpoint
Mark DiGiovanni – Sr. Manager, Professional Services, Proofpoint

Learn More

CISO / Thought Leadership

Effective Security Metrics for Your CFO

A CISO is able to craft an effective business case, supported by metrics, which assures the Executive leadership and the CFO that their investment is necessary and represents tangible value. Join our panel to explore various approaches to cultivating effective metrics which can underpin your business case and raise your profile in the eyes of the CFO.

Speakers:

Krishnan Chellakarai - CISO, Gilead Sciences
Michael Montoya - CISO, Equinix
Lucia Milică - Global Resident CISO, Proofpoint
John Checco - Resident CISO, FinServ, Proofpoint

Learn More

CISO’s, Systemic Risk and The Board

Systemic risk and cybersecurity are conspiring to create new catastrophic risks for every company, their customers and suppliers. From SolarWinds to Microsoft, hackers have figured out how to exploit systemic weaknesses in the complex digital business. Join the conversation on the explosive issue of systemic risk and the role of CISO and the boardroom.

Speakers:

Bob Zukis - Founder and CEO, Digital Directors Network
Lucia Milică - Global Resident CISO, Proofpoint

Learn More

New Care Models, Same Cybersecurity Challenges in Healthcare

Nearly all cyberattacks in healthcare start with an email. Securing email is critical to securing healthcare.

Our healthcare security expert panel will share:

• Healthcare-themed cyber threats
• Controls to protect people and patients
•Best practices and recommendations

Speaker:

Julie Hubbard - CISO, AMN Healthcare
Jason Powell - CISO, Brookdale Senior Living
Mike Gregory - CISO, Community of Northwest Indiana
Ryan Witt - Industry Practice Leader, Proofpoint

Learn More

Mindset of the Financial Services CISO: Local Regulations, Global Threats

The Financial Services information protection landscape is constantly changing. Our threats are global, but our regulatory and compliance requirements are defined by local and national agencies. In this panel, senior security executives will come together to discuss regional regulatory pressures.

Speakers:

Paul Ferrillo - Privacy & Cybersecurity Partner, Seyfarth Shaw, LLP
Stephen Pecchia - Former Managing Director, Business Risk & Reliance, DTCC
John Checco - Resident CISO, Proofpoint

Learn More

Protecting People - Public Sector’s New Cyber Battle Ground

Cybercriminals know that people are the weak link in the cybersecurity chain. Government agencies must adapt to mitigate against this growing attack vector.

Our panel will discuss:

• Threats targeting federal agencies
• Controls to protect people and citizens
• Strategies to keep and safeguard users

Speakers:

Michael Baker - CISO, General Dynamics IT
Deborah Watson - Resident CISO, Proofpoint

Learn More

Information Protection and Cloud Security

Raise the Bar for your Cloud Security: What’s Changed in a "Work from Anywhere" World

The move to remote work and accelerated adoption of cloud applications has many IT security professionals playing catch up to secure their users and applications. In this session, we will cover how Proofpoint’s cloud security technologies including CASB, Isolation, ZTNA and web security are integrated together to provide secure access, stop threats and enforce DLP in today’s work from anywhere world.

Speakers:

  • David Knight - EVP and GM Cloud Security Group, Proofpoint
  • Elad Horn - VP Product Management Cloud Security, Proofpoint

Learn More

How to Jump Start a DLP Program

The modern threat landscape is increasingly complex. Email continues to be the number 1 threat vector. Many organizations use multiple security solutions to address this complex security problem. Join this Proofpoint customer session to learn how an integrated, multi-layered solution can improve your security posture and simplify your management overhead.

Speakers:

  • Marc Atkinson - CISO, Paychex
  • Jeff White - Sr. Manager, Better.com
  • Jeremy Wittkop - Sr. Director Technical Services PCMS, Proofpoint

Learn More

Successful Strategies to Combat Insider Threat and Protect Sensitive Data

Insider threats cost organizations $11.45 million, an increase of 31% in just two years.

Hear from peers how they:

  • Established a budget
  • Built a program to identify and mitigate insider threats, yet balance user and data privacy
  • Evolved from insider threat to insider risk with a platform approach

Speaker:

  • Robert McIntyre - CISO, Tetrapak
  • Brian Reed - Product Evangelist, Proofpoint

Learn More

Practitioner’s Session: Tackling Key Use Cases for Cloud Security and Information Protection

Learn best practices to tackle key information use cases in new ways – whether you’re protecting data loss through email, cloud, endpoint, or new vectors such as OAuth. We will show the controls, reporting, and investigative process to help you identify risks from negligent, compromised, and malicious users.

Speakers:

  • Matt Lyle - Professional Services Architect, Proofpoint
  • Erich Anderson - Sr. Professional Services Consultant, Proofpoint
  • Mike Stacy - Global Cloud and Information Protection Director, Proofpoint

Learn More

Threat Protection

Practitioner's Session: Supercharge your Threat Protection Program with Integration

How you integrate the components of your threat protection program can be the difference between a go-kart or a Ferrari. Learn how to configure and use integrations between Targeted Attack Protection, Isolation and Security Awareness Training to supercharge your security program.

Speaker:

  • Colleen Gaffney - Manager, PSAT Managed Services, Proofpoint
  • Ted Roberts - Sr. Professional Services Consultant, Proofpoint

Learn More

Strategies for Stopping Business Email Compromise Attacks

Business Email Compromise (BEC) comes in many forms: gift card scams, payroll diversion schemes, supplier invoicing fraud and more. Regardless of the attack type, BEC leads the pack in cybercrime losses – nearly $2B in 2020. Join this customer session to gain insights on how to prevent BEC attacks.

Speakers:

  • Chris Ard - CISO, Newmont
  • Arin Tufts - Sr. Security Analyst, Newmont
  • Sara Pan - Sr. Product Marketing Manager, Proofpoint

Learn More

Best Practices for Preventing Account Takeover

As organizations shift to the cloud, stolen credentials become the new currency for cyber criminals. Credential phishing attacks lead to compromised accounts, which exposes your organization to greater risk. Join this session to learn how a Proofpoint customer is defending against account takeover.

Speakers:

  • John Tziortzis - Director of Cyber Security and Enterprise Systems, Centennial College
  • Brett Shaw - Sr. Product Marketing Manager, Proofpoint

Learn More

Practitioner’s Session: Preventing Business Email Compromise and Email Account Compromise

Whether by spoofing an identity (BEC) or stealing a valid identity (EAC), attackers’ use of identity deception is on the rise. Learn actions and configurations you can implement with Proofpoint to protect your people from BEC and EAC.

Speakers:

  • Mike Olden - Principal Professional Services Consultant, Proofpoint
  • Mike Beninda - Principal Professional Services Consultant, Proofpoint

Learn More

Compliance

Compliance in a Post-Pandemic World

As the public health landscape changes, employees are going to start returning to offices. Yet the move to remote work has altered the way we work, and many of the repercussions are likely here to stay. Join us and hear how compliance leaders are planning for compliance in the post-pandemic era.

Speakers:

  • Maria Ringer - VP, WIM Social Media Program Manager, Wells Fargo
  • Sima Patel - Director of Digital Wealth Management, Merrill Lynch
  • Jasmine Wu - Director, Product Marketing, Proofpoint

Learn More

The Importance of Properly Handling Meeting Content

Virtual meetings have become a staple of modern business communications. Your employees are likely using Zoom, WebEx, or Microsoft Teams to collaborate. And you’re likely considering how to account for compliance and e-discovery needs when it comes to video & audio content. Join us to learn more!

Speakers:

  • Tim Anderson - Managing Director, FTI Technology
  • John Pepe – Resident Chief Compliance and Regulatory Officer, Proofpoint
  • Davin Stilson – Manager, Sales Engineering, Proofpoint

Learn More

Using NexusAI Machine Learning to Ensure Regulatory Compliance

Reviewing false positives are a pain and burns the hours away! Whether you’re supervising digital communications or not, this session is a must-attend to learn how you can put Proofpoint’s latest AI/ML technology to work for you in helping ensure efficient, more intelligent regulatory compliance.

Speakers:

  • Rick Dales – Director, Product Marketing, Proofpoint
  • Dan Rapp – Director, Product Management, Proofpoint

Learn More

Search Your Proofpoint Archive and Receive Results Within Seconds!

Not all archives are created equal. Whether you’re using legacy or modern solutions that can’t keep up, if your IT or Legal teams are struggling to address e-discovery requests, this session is for you. We’ll share e-discovery & compliance research insights and show you how Proofpoint can help.

Speakers:

  • Julie Jensen, Senior Counsel, Financial Services Industry
  • Davin Stilson – Manager, Sales Engineering, Proofpoint
  • Shawn Aquino – Sr. Product Marketing Manager, Proofpoint

Learn More

Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products

Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

Speaker:

  • Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint

Learn More

CISO / Thought Leadership

Effective Security Metrics for Your CFO

A CISO is able to craft an effective business case, supported by metrics, which assures the Executive leadership and the CFO that their investment is necessary and represents tangible value. Join our panel to explore various approaches to cultivating effective metrics which can underpin your business case and raise your profile in the eyes of the CFO.

Speakers:

  • Krishnan Chellakarai - CISO, Gilead Sciences
  • Michael Montoya - CISO, Equinix
  • Lucia Milică - Global Resident CISO, Proofpoint
  • John Checco - Resident CISO, FinServ, Proofpoint

Learn More

CISO’s, Systemic Risk and The Board

Systemic risk and cybersecurity are conspiring to create new catastrophic risks for every company, their customers and suppliers. From SolarWinds to Microsoft, hackers have figured out how to exploit systemic weaknesses in the complex digital business. Join the conversation on the explosive issue of systemic risk and the role of CISO and the boardroom.

Speaker:

  • Bob Zukis - Founder and CEO, Digital Directors Network
  • Lucia Milică - Global Resident CISO, Proofpoint

Learn More

New Care Models, Same Cybersecurity Challenges in Healthcare

Nearly all cyberattacks in healthcare start with an email. Securing email is critical to securing healthcare.

Our healthcare security expert panel will share:

  • Healthcare-themed cyber threats
  • Controls to protect people and patients
  • Best practices and recommendations

Speakers:

  • Julie Hubbard - CISO, AMN Healthcare
  • Jason Powell - CISO, Brookdale Senior Living
  • Mike Gregory - CISO, Community of Northwest Indiana
  • Ryan Witt - Industry Practice Leader, Proofpoint

Learn More

Mindset of the Financial Services CISO: Local Regulations, Global Threats

The Financial Services information protection landscape is constantly changing. Our threats are global, but our regulatory and compliance requirements are defined by local and national agencies. In this panel, senior security executives will come together to discuss regional regulatory pressures.

Speakers:

  • Paul Ferrillo - Privacy & Cybersecurity Partner, Seyfarth Shaw, LLP
  • Stephen Pecchia - Former Managing Director, Business Risk & Reliance, DTCC
  • John Checco - Resident CISO, Proofpoint

Learn More

Protecting People - Public Sector’s New Cyber Battle Ground

Cybercriminals know that people are the weak link in the cybersecurity chain. Government agencies must adapt to mitigate against this growing attack vector.

Our panel will discuss:

  • Threats targeting federal agencies
  • Controls to protect people and citizens
  • Strategies to keep and safeguard users

Speakers:

  • Michael Baker - CISO, General Dynamics IT
  • Deborah Watson - Resident CISO, Proofpoint

Learn More