Briefing Center Presentation
Proofpoint Briefing Center Presentation
Title: Identity, Data, Email, Endpoint – The 4 Horsemen of the Security Apocalypse
Date: Tuesday, April 25
Time: 11:00-11:30 AM PT
Location: Moscone North Expo Hall, Booth #6545
Join Brian Reed, Director of Cybersecurity Strategy, Proofpoint present Identity, Data, Email, Endpoint – The 4 Horsemen of the Security Apocalypse.
The pace of innovation and digital transformation results in the need for organizations to understand and secure their four most important vectors – identity, data, email, endpoint. Identity and data security intersections are self-evident; however, we must secure both the primary ways users collaborate (email) and the primary location where content is created and changed (at the endpoint).
Brian Reed
Senior Director of Cybersecurity Strategy
Proofpoint
Expo Passes on Us
We have Free Expo Passes and discounted Exhibit Hall passes using the discount codes below.
Discount ticket - $150 off the full conference price
Registration link: https://path.rsaconference.com/flow/rsac/us23/us23regdefault/login
Discount Code: 54FCDPROOFP
Free pass- Expo only
Registration link: https://path.rsaconference.com/flow/rsac/us23/us23regdefault/login
Invitation Code: 54SPROOFPXP
These passes are for the Expo Halls only and include all briefing sessions within the Expo Halls.
Learn more about RSA Passes and Rates here.
Expo Hours:
Monday, April 24 | 5:00 PM– 7:00 PM PT
Tuesday, April 25 | 10:00 AM – 6:00 PM PT
Wednesday, April 26 | 10:00 AM – 6:00 PM PT
Thursday, April 27 | 10:00 AM – 3:00 PM PT
Booth - Theater Presentations
Stop by booth #6253 to meet Proofpoint staff and learn how our solutions can help you break the cybersecurity attack chain.
Theater Session Program Schedule
Monday, April 24
Expo Hall Hours 5:00 – 7:00 PM
Time | Title | Description | Product Solution |
---|---|---|---|
5:15 - 5:35 PM | Stop Data from Leaving with Departing Employees | Departing employees often take sensitive business information when leaving the company. Given the high rate of employee turnover, it’s imperative that organizations protect their valuable data from walking out the door. Learn how to gain visibility into employee behavior before they leave the organization, prevent data loss and accelerate insider investigations. | Sigma Information Protection |
6:00 - 6:20 PM |
Defending Against Account Takeovers and Supplier Threats from Compromised Accounts | Bad actors can cause significant harm if they are able to successfully take over an account within a company. Everything from stealing data and implanting malicious files to using compromised accounts to send malicious emails internally and externally. We will discuss this topic from 2 angles, preventing, detecting, and remedying account takeovers and how to protect yourself from partners and suppliers you interact with that have been compromised. | Aegis Threat Protection |
Tuesday, April 25
Expo Hall Hours 10:00 – 6:00 PM
Time | Title | Production Solution | Production Solution |
---|---|---|---|
10:15 - 10:35 AM | Stop Data from Leaving with Departing Employees | Departing employees often take sensitive business information when leaving the company. Given the high rate of employee turnover, it’s imperative that organizations protect their valuable data from walking out the door. Learn how to gain visibility into employee behavior before they leave the organization, prevent data loss and accelerate insider investigations. | Sigma Information Protection |
11:15 - 11:35 AM | Augmenting M365 to Protect People and Defend Data | Many organizations that adopt cloud collaboration platforms like Microsoft 365 rely on native security capabilities. But to stay ahead of today’s advanced threats, organizations need to supplement built-in protections. Learn what key use cases to address to better protect your people, defend data, and secure your Microsoft investment. | Proofpoint Solutions |
12:15 - 12:35 PM | Protect Against Targeted Ransomware Attacks with Proofpoint and SentinelOne | Attendees will learn about the importance of protecting against targeted ransomware attacks and how the integration between SentinelOne and Proofpoint creates a unified defense system from email to enterprise. The speakers showcase how the combined solutions from SentinelOne and Proofpoint can detect and prevent email-based attacks at every step of the attack chain. Attendees will leave with a clear understanding of the benefits of these integrated solutions and how to implement them in their organization. | Partner Session |
1:15 - 1:35 PM | Defending against Account Takeovers and Supplier Threats from Compromised Accounts | Bad actors can cause significant harm if they are able to successfully take over an account within a company. Everything from stealing data and implanting malicious files to using compromised accounts to send malicious emails internally and externally. We will discuss this topic from 2 angles, preventing, detecting, and remedying account takeovers and how to protect yourself from partners and suppliers you interact with that have been compromised. | Aegis Threat Protection |
2:15 - 2:35 PM | Build a Security Awareness Program that Drives Behavior Change and Real Security Outcomes | Attackers target people. While most organizations have a security awareness program, only a few find their programs impactful. Proofpoint’s holistic approach to security education enables you to help users establish sustainable security habits and drive real security outcomes. | Aegis Security Awareness |
3:15 - 3:35 PM | Optimize your Information Security stack with Proofpoint and ServiceNow | Attendees will learn how Proofpoint's Sigma platform works with ServiceNow's DLPir model to better manage Information Protection (DLP) incidents for joint customers. | Partner Session |
4:15 - 4:35 PM | Very Attacked People (VAP) and People-centric Insights | Security teams need to know who your Very Attacked People, or VAPs, are to better protect them against the threats that target your organization. The Proofpoint Attack Index helps identify these VAPs and gives insights into the actions you can take to protect your people. Learn how to better understand your VAPs and prioritize the most effective ways to resolve threats. | Aegis Threat Protection |
5:00 - 5:20 PM | Identity as a Critical Threat in the Attack Chain | Identity risk has become a key concern to today’s modern CISO and organization because it’s proven to be a critical vulnerability in the attack chain. To protect people, data, and digital assets, you must first identify and prevent identity vulnerabilities. Learn how to prevent identity risks, remediate identity vulnerabilities, and detect and stop lateral movement in action. | Identity Threat Defense |
Wednesday, April 26
Expo Hall Hours 10:00 – 6:00 PM
Time | Title | Production Solution | Production Solution |
---|---|---|---|
10:15 - 10:35 AM | Build a Security Awareness Program that Drives Behavior Change and Real Security Outcomes | Attackers target people. While most organizations have a security awareness program, only a few find their programs impactful. Proofpoint’s holistic approach to security education enables you to help users establish sustainable security habits and drive real security outcomes. | Aegis Security Awareness |
11:15 - 11:35 AM | Augmenting M365 to Protect People and Defend Data | Many organizations that adopt cloud collaboration platforms like Microsoft 365 rely on native security capabilities. But to stay ahead of today’s advanced threats, organizations need to supplement built-in protections. Learn what key use cases to address to better protect your people, defend data, and secure your Microsoft investment. | Proofpoint Solutions |
12:15 - 12:35 PM | Mitigate Insider threats with Proofpoint and CrowdStrike | Attendees will learn how Proofpoint (solutions: IMD, CASB, SWG/ZTNA) and CrowdStrike (solutions: Falcon Intelligence, INsight XDR, Identity) work together to reduce risk from compromised and malicious users for our joint customers. | Partner Session |
1:15 - 1:35 PM | Very Attacked People (VAP) and People-centric Insights | Security teams need to know who your Very Attacked People, or VAPs, are to better protect them against the threats that target your organization. The Proofpoint Attack Index helps identify these VAPs and gives insights into the actions you can take to protect your people. Learn how to better understand your VAPs and prioritize the most effective ways to resolve threats. | Aegis Threat Protection |
2:15 - 2:35 PM | Defending Against Account Takeovers and Supplier Threats from Compromised Accounts | Attackers target people. While most organizations have a security awareness program, only a few find their programs impactful. Proofpoint’s holistic approach to security education enables you to help users establish sustainable security habits and drive real security outcomes. | Aegis Threat Protection |
3:15 - 3:35 PM | Stop Data from Leaving with Departing Employees | Departing employees often take sensitive business information when leaving the company. Given the high rate of employee turnover, it’s imperative that organizations protect their valuable data from walking out the door. Learn how to gain visibility into employee behavior before they leave the organization, prevent data loss and accelerate insider investigations. | Partner Session |
4:15 - 4:35 PM | Identity as a Critical Threat in the Attack Chain | Identity risk has become a key concern to today’s modern CISO and organization because it’s proven to be a critical vulnerability in the attack chain. To protect people, data, and digital assets, you must first identify and prevent identity vulnerabilities. Learn how to prevent identity risks, remediate identity vulnerabilities, and detect and stop lateral movement in action. | Identity Threat Defense |
5:00 - 5:20 PM | Protecting Privileged Identities with a People-Centric Approach with Proofpoint and CyberArk | Come to this session to learn how CyberArk and Proofpoint can break the attack chain lifecycle. Our defense-in-depth approach helps organizations quickly and efficiently increase authentication requirements for people that may have been compromised within your organization to prevent the spread of malware and to prevent attackers from gaining access to your most sensitive assets. | Partner Session |
Thursday, April 27
Expo Hall Hours 10:00 – 3:00 PM
Time | Title | Production Solution | Production Solution |
---|---|---|---|
10:15 - 10:35 AM | Defending Against Account Takeovers and Supplier Threats from Compromised Accounts | Bad actors can cause significant harm if they are able to successfully take over an account within a company. Everything from stealing data and implanting malicious files to using compromised accounts to send malicious emails internally and externally. We will discuss this topic from 2 angles, preventing, detecting, and remedying account takeovers and how to protect yourself from partners and suppliers you interact with that have been compromised. | Aegis Threat Protection |
11:15 - 11:35 AM | Augmenting M365 to Protect People and Defend Data | Many organizations that adopt cloud collaboration platforms like Microsoft 365 rely on native security capabilities. But to stay ahead of today’s advanced threats, organizations need to supplement built-in protections. Learn what key use cases to address to better protect your people, defend data, and secure your Microsoft investment. | Proofpoint Solutions |
12:15 - 12:35 PM | Stop Data from Leaving with Departing Employees | Departing employees often take sensitive business information when leaving the company. Given the high rate of employee turnover, it’s imperative that organizations protect their valuable data from walking out the door. Learn how to gain visibility into employee behavior before they leave the organization, prevent data loss and accelerate insider investigations. | Sigma Information Protection |
1:15 - 1:35 PM | Identity as a Critical Threat in the Attack Chain | Identity risk has become a key concern to today’s modern CISO and organization because it’s proven to be a critical vulnerability in the attack chain. To protect people, data, and digital assets, you must first identify and prevent identity vulnerabilities. Learn how to prevent identity risks, remediate identity vulnerabilities, and detect and stop lateral movement in action. | Identity Threat Defense |
Executive Meetings
Request a meeting with our executive team. Every year Proofpoint’s executive team makes themselves available for meetings with customers, prospects, and analysts at or near the RSA Conference. Register here and we will reach out to you to schedule a meeting.
Executive Security Action Forum
Proofpoint is honored to be a Premier sponsor at the RSAC Executive Security Action Forum (ESAF). This one-day program, held during RSAC week, is an association of senior information security and risk executives from Global 1000 companies and government. This trusted Forum has a long history of frank, meaningful, and confidential discussions and unparalleled networking among peers.
ESAF events are invitation-only and closed-door, enabling security executives to candidly share insights, discuss key issues, and find actionable solutions to today’s information risk management challenges. Members meet every year at the ESAF Annual Meeting held in conjunction with RSA Conference.
Special for Our Customers
If you are a Proofpoint Customer, we have something special for you either on Monday, April 24, or Tuesday, April 25, 2023. Join us for one of our private dinners where you can connect with Proofpoint, peers, and top cybersecurity experts.
Customer Dinner(s) are scheduled from : 6:00 – 9:00 pm PT
Please register with your business email.
You will receive a confirmation of your attendance by email.
Thank you for your submission.
Our events team will reach out to confirm your reservation.
For questions, reach out to events@proofpoint.com