Interested in receiving updates about Protect 2022?
Thank you for your interest!
General Sessions

Proofpoint Welcome Keynote with Gary Steele, CEO
Gary Steele - Chief Executive Officer, Proofpoint
Watch now
Risky Business Live
Patrick Gray - Risky.Biz
Paige Adams - Group CISO, Zurich Insurance
David McLeod - VP and CISO, Cox Enterprises
Sherrod DeGrippo - Sr. Director, Threat Research and Detection, Proofpoint

Ready for What's Next: The Proofpoint Roadmap
Amol Kulkarni - Chief Product & Engineering Officer, CrowdStrike
Joe Diamond - VP, Enterprise Strategy & Product Marketing, Okta
Ryan Kalember - EVP Cybersecurity Strategy, Proofpoint

Technology and the Human Factor at the Highest Level of Golf
Bryson DeChambeau - US Open Champion
Blake Sallé, Chief Revenue Officer - Proofpoint
Information Protection and Cloud Security
Raise the Bar for your Cloud Security: What’s Changed in a "Work from Anywhere" World
The move to remote work and accelerated adoption of cloud applications has many IT security professionals playing catch up to secure their users and applications. In this session, we will cover how Proofpoint’s cloud security technologies including CASB, Isolation, ZTNA and web security are integrated together to provide secure access, stop threats and enforce DLP in today’s work from anywhere world.
Speakers:
David Knight - EVP and GM Cloud Security Group, Proofpoint
Elad Horn - VP Product Management Cloud Security, Proofpoint
How to Jump Start a DLP Program
Need to elevate your DLP program to address new use cases? Kicking off a new DLP program? Hear from peers and InteliSecure on effective strategies, common project pitfalls, and actionable advice to navigate these waters and better protect against accidental mistakes, attacks, and insider risk.
Speakers:
Marc Atkinson - CISO, Paychex
Jeff White - Sr. Manager, Better.com
Jeremy Wittkop - Sr. Director Technical Services PCMS, Proofpoint
Successful Strategies to Combat Insider Threat and Protect Sensitive Data
Insider threats cost organizations $11.45 million, an increase of 31% in just two years.
Hear from peers how they:
• Established a budget
• Built a program to identify and mitigate insider threats, yet balance user and data privacy
• Evolved from insider threat to insider risk with a platform approach
Speaker:
Robert McIntyre - CISO, Tetrapak
Brian Reed - Product Evangelist, Proofpoint
Practitioner’s Session: Tackling Key Use Cases for Cloud Security and Information Protection
Learn best practices to tackle key information use cases in new ways – whether you’re protecting data loss through email, cloud, endpoint, or new vectors such as OAuth. We will show the controls, reporting, and investigative process to help you identify risks from negligent, compromised, and malicious users.
Speakers:
Matt Lyle - Professional Services Architect, Proofpoint
Erich Anderson - Sr. Professional Services Consultant, Proofpoint
Mike Stacy - Global Cloud and Information Protection Director, Proofpoint
Threat Protection
Practitioner's Session: Supercharge your Threat Protection Program with Integration
How you integrate the components of your threat protection program can be the difference between a go-kart or a Ferrari. Learn how to configure and use integrations between Targeted Attack Protection, Isolation and Security Awareness Training to supercharge your security program.
Speaker:
Colleen Gaffney - Manager, PSAT Managed Services, Proofpoint
Ted Roberts - Sr. Professional Services Consultant, Proofpoint
Strategies for Stopping Business Email Compromise Attacks
Business Email Compromise (BEC) comes in many forms: gift card scams, payroll diversion schemes, supplier invoicing fraud and more. Regardless of the attack type, BEC leads the pack in cybercrime losses – nearly $2B in 2020. Join this customer session to gain insights on how to prevent BEC attacks.
Speakers:
Chris Ard - CISO, Newmont
Arin Tufts - Sr. Security Analyst, Newmont
Sara Pan - Sr. Product Marketing Manager, Proofpoint
Best Practices for Preventing Account Takeover
As organizations shift to the cloud, stolen credentials become the new currency for cyber criminals. Credential phishing attacks lead to compromised accounts, which exposes your organization to greater risk. Join this session to learn how a Proofpoint customer is defending against account takeover.
Speakers:
John Tziortzis - Director of Cyber Security and Enterprise Systems, Centennial College
Brett Shaw - Sr. Product Marketing Manager, Proofpoint
Practitioner’s Session: Preventing Business Email Compromise and Email Account Compromise
Whether by spoofing an identity (BEC) or stealing a valid identity (EAC), attackers’ use of identity deception is on the rise. Learn actions and configurations you can implement with Proofpoint to protect your people from BEC and EAC.
Speakers:
Mike Olden - Principal Professional Services Consultant, Proofpoint
Mike Beninda - Principal Professional Services Consultant, Proofpoint
Compliance
Compliance in a Post-Pandemic World
As the public health landscape changes, employees are going to start returning to offices. Yet the move to remote work has altered the way we work, and many of the repercussions are likely here to stay. Join us and hear how compliance leaders are planning for compliance in the post-pandemic era.
Speakers:
Maria Ringer - VP, WIM Social Media Program Manager, Wells Fargo
Sima Patel - Director of Digital Wealth Management, Merrill Lynch
Jasmine Wu - Director, Product Marketing, Proofpoint
The Importance of Properly Handling Meeting Content
Virtual meetings have become a staple of modern business communications. Your employees are likely using Zoom, WebEx, or Microsoft Teams to collaborate. And you’re likely considering how to account for compliance and e-discovery needs when it comes to video & audio content. Join us to learn more!
Speakers:
Tim Anderson - Managing Director, FTI Technology
John Pepe – Resident Chief Compliance and Regulatory Officer, Proofpoint
Davin Stilson – Manager, Sales Engineering, Proofpoint
Using NexusAI Machine Learning to Ensure Regulatory Compliance
Reviewing false positives are a pain and burns the hours away! Whether you’re supervising digital communications or not, this session is a must-attend to learn how you can put Proofpoint’s latest AI/ML technology to work for you in helping ensure efficient, more intelligent regulatory compliance.
Speakers:
Rick Dales – Director, Product Marketing, Proofpoint
Dan Rapp – Director, Product Management, Proofpoint
Search Your Proofpoint Archive and Receive Results Within Seconds!
Not all archives are created equal. Whether you’re using legacy or modern solutions that can’t keep up, if your IT or Legal teams are struggling to address e-discovery requests, this session is for you. We’ll share e-discovery & compliance research insights and show you how Proofpoint can help.
Speaker:
Julie Jensen, Senior Counsel, Financial Services Industry
Davin Stilson – Manager, Sales Engineering, Proofpoint
Shawn Aquino – Sr. Product Marketing Manager, Proofpoint
Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products
Realizing the value of Proofpoint’s Compliance products requires: 1) successful migration, 2) implementation and 3) staying up to date with product features. This session will focus on our implementation methodology covering the do’s, don’ts, and tips learned from real-world scenarios. Do not miss this!
Speakers:
Sara Lints - Sr. Manager Professional Services, Proofpoint
Ray McGrath – Manager, Professional Services, Proofpoint
Mark DiGiovanni – Sr. Manager, Professional Services, Proofpoint
CISO / Thought Leadership
Effective Security Metrics for Your CFO
A CISO is able to craft an effective business case, supported by metrics, which assures the Executive leadership and the CFO that their investment is necessary and represents tangible value. Join our panel to explore various approaches to cultivating effective metrics which can underpin your business case and raise your profile in the eyes of the CFO.
Speakers:
Krishnan Chellakarai - CISO, Gilead Sciences
Michael Montoya - CISO, Equinix
Lucia Milică - Global Resident CISO, Proofpoint
John Checco - Resident CISO, FinServ, Proofpoint
CISO’s, Systemic Risk and The Board
Systemic risk and cybersecurity are conspiring to create new catastrophic risks for every company, their customers and suppliers. From SolarWinds to Microsoft, hackers have figured out how to exploit systemic weaknesses in the complex digital business. Join the conversation on the explosive issue of systemic risk and the role of CISO and the boardroom.
Speakers:
Bob Zukis - Founder and CEO, Digital Directors Network
Lucia Milică - Global Resident CISO, Proofpoint
New Care Models, Same Cybersecurity Challenges in Healthcare
Nearly all cyberattacks in healthcare start with an email. Securing email is critical to securing healthcare.
Our healthcare security expert panel will share:
• Healthcare-themed cyber threats
• Controls to protect people and patients
•Best practices and recommendations
Speaker:
Julie Hubbard - CISO, AMN Healthcare
Jason Powell - CISO, Brookdale Senior Living
Mike Gregory - CISO, Community of Northwest Indiana
Ryan Witt - Industry Practice Leader, Proofpoint
Mindset of the Financial Services CISO: Local Regulations, Global Threats
The Financial Services information protection landscape is constantly changing. Our threats are global, but our regulatory and compliance requirements are defined by local and national agencies. In this panel, senior security executives will come together to discuss regional regulatory pressures.
Speakers:
Paul Ferrillo - Privacy & Cybersecurity Partner, Seyfarth Shaw, LLP
Stephen Pecchia - Former Managing Director, Business Risk & Reliance, DTCC
John Checco - Resident CISO, Proofpoint
Protecting People - Public Sector’s New Cyber Battle Ground
Cybercriminals know that people are the weak link in the cybersecurity chain. Government agencies must adapt to mitigate against this growing attack vector.
Our panel will discuss:
• Threats targeting federal agencies
• Controls to protect people and citizens
• Strategies to keep and safeguard users
Speakers:
Michael Baker - CISO, General Dynamics IT
Deborah Watson - Resident CISO, Proofpoint
Information Protection and Cloud Security
Raise the Bar for your Cloud Security: What’s Changed in a "Work from Anywhere" World
The move to remote work and accelerated adoption of cloud applications has many IT security professionals playing catch up to secure their users and applications. In this session, we will cover how Proofpoint’s cloud security technologies including CASB, Isolation, ZTNA and web security are integrated together to provide secure access, stop threats and enforce DLP in today’s work from anywhere world.
Speakers:
- David Knight - EVP and GM Cloud Security Group, Proofpoint
- Elad Horn - VP Product Management Cloud Security, Proofpoint
How to Jump Start a DLP Program
The modern threat landscape is increasingly complex. Email continues to be the number 1 threat vector. Many organizations use multiple security solutions to address this complex security problem. Join this Proofpoint customer session to learn how an integrated, multi-layered solution can improve your security posture and simplify your management overhead.
Speakers:
- Marc Atkinson - CISO, Paychex
- Jeff White - Sr. Manager, Better.com
- Jeremy Wittkop - Sr. Director Technical Services PCMS, Proofpoint
Successful Strategies to Combat Insider Threat and Protect Sensitive Data
Insider threats cost organizations $11.45 million, an increase of 31% in just two years.
Hear from peers how they:
- Established a budget
- Built a program to identify and mitigate insider threats, yet balance user and data privacy
- Evolved from insider threat to insider risk with a platform approach
Speaker:
- Robert McIntyre - CISO, Tetrapak
- Brian Reed - Product Evangelist, Proofpoint
Practitioner’s Session: Tackling Key Use Cases for Cloud Security and Information Protection
Learn best practices to tackle key information use cases in new ways – whether you’re protecting data loss through email, cloud, endpoint, or new vectors such as OAuth. We will show the controls, reporting, and investigative process to help you identify risks from negligent, compromised, and malicious users.
Speakers:
- Matt Lyle - Professional Services Architect, Proofpoint
- Erich Anderson - Sr. Professional Services Consultant, Proofpoint
- Mike Stacy - Global Cloud and Information Protection Director, Proofpoint
Threat Protection
Practitioner's Session: Supercharge your Threat Protection Program with Integration
How you integrate the components of your threat protection program can be the difference between a go-kart or a Ferrari. Learn how to configure and use integrations between Targeted Attack Protection, Isolation and Security Awareness Training to supercharge your security program.
Speaker:
- Colleen Gaffney - Manager, PSAT Managed Services, Proofpoint
- Ted Roberts - Sr. Professional Services Consultant, Proofpoint
Strategies for Stopping Business Email Compromise Attacks
Business Email Compromise (BEC) comes in many forms: gift card scams, payroll diversion schemes, supplier invoicing fraud and more. Regardless of the attack type, BEC leads the pack in cybercrime losses – nearly $2B in 2020. Join this customer session to gain insights on how to prevent BEC attacks.
Speakers:
- Chris Ard - CISO, Newmont
- Arin Tufts - Sr. Security Analyst, Newmont
- Sara Pan - Sr. Product Marketing Manager, Proofpoint
Best Practices for Preventing Account Takeover
As organizations shift to the cloud, stolen credentials become the new currency for cyber criminals. Credential phishing attacks lead to compromised accounts, which exposes your organization to greater risk. Join this session to learn how a Proofpoint customer is defending against account takeover.
Speakers:
- John Tziortzis - Director of Cyber Security and Enterprise Systems, Centennial College
- Brett Shaw - Sr. Product Marketing Manager, Proofpoint
Practitioner’s Session: Preventing Business Email Compromise and Email Account Compromise
Whether by spoofing an identity (BEC) or stealing a valid identity (EAC), attackers’ use of identity deception is on the rise. Learn actions and configurations you can implement with Proofpoint to protect your people from BEC and EAC.
Speakers:
- Mike Olden - Principal Professional Services Consultant, Proofpoint
- Mike Beninda - Principal Professional Services Consultant, Proofpoint
Compliance
Compliance in a Post-Pandemic World
As the public health landscape changes, employees are going to start returning to offices. Yet the move to remote work has altered the way we work, and many of the repercussions are likely here to stay. Join us and hear how compliance leaders are planning for compliance in the post-pandemic era.
Speakers:
- Maria Ringer - VP, WIM Social Media Program Manager, Wells Fargo
- Sima Patel - Director of Digital Wealth Management, Merrill Lynch
- Jasmine Wu - Director, Product Marketing, Proofpoint
The Importance of Properly Handling Meeting Content
Virtual meetings have become a staple of modern business communications. Your employees are likely using Zoom, WebEx, or Microsoft Teams to collaborate. And you’re likely considering how to account for compliance and e-discovery needs when it comes to video & audio content. Join us to learn more!
Speakers:
- Tim Anderson - Managing Director, FTI Technology
- John Pepe – Resident Chief Compliance and Regulatory Officer, Proofpoint
- Davin Stilson – Manager, Sales Engineering, Proofpoint
Using NexusAI Machine Learning to Ensure Regulatory Compliance
Reviewing false positives are a pain and burns the hours away! Whether you’re supervising digital communications or not, this session is a must-attend to learn how you can put Proofpoint’s latest AI/ML technology to work for you in helping ensure efficient, more intelligent regulatory compliance.
Speakers:
- Rick Dales – Director, Product Marketing, Proofpoint
- Dan Rapp – Director, Product Management, Proofpoint
Search Your Proofpoint Archive and Receive Results Within Seconds!
Not all archives are created equal. Whether you’re using legacy or modern solutions that can’t keep up, if your IT or Legal teams are struggling to address e-discovery requests, this session is for you. We’ll share e-discovery & compliance research insights and show you how Proofpoint can help.
Speakers:
- Julie Jensen, Senior Counsel, Financial Services Industry
- Davin Stilson – Manager, Sales Engineering, Proofpoint
- Shawn Aquino – Sr. Product Marketing Manager, Proofpoint
Practitioner’s Session: Realizing Value from Your Proofpoint Compliance Products
Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.
Speaker:
- Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint
CISO / Thought Leadership
Effective Security Metrics for Your CFO
A CISO is able to craft an effective business case, supported by metrics, which assures the Executive leadership and the CFO that their investment is necessary and represents tangible value. Join our panel to explore various approaches to cultivating effective metrics which can underpin your business case and raise your profile in the eyes of the CFO.
Speakers:
- Krishnan Chellakarai - CISO, Gilead Sciences
- Michael Montoya - CISO, Equinix
- Lucia Milică - Global Resident CISO, Proofpoint
- John Checco - Resident CISO, FinServ, Proofpoint
CISO’s, Systemic Risk and The Board
Systemic risk and cybersecurity are conspiring to create new catastrophic risks for every company, their customers and suppliers. From SolarWinds to Microsoft, hackers have figured out how to exploit systemic weaknesses in the complex digital business. Join the conversation on the explosive issue of systemic risk and the role of CISO and the boardroom.
Speaker:
- Bob Zukis - Founder and CEO, Digital Directors Network
- Lucia Milică - Global Resident CISO, Proofpoint
New Care Models, Same Cybersecurity Challenges in Healthcare
Nearly all cyberattacks in healthcare start with an email. Securing email is critical to securing healthcare.
Our healthcare security expert panel will share:
- Healthcare-themed cyber threats
- Controls to protect people and patients
- Best practices and recommendations
Speakers:
- Julie Hubbard - CISO, AMN Healthcare
- Jason Powell - CISO, Brookdale Senior Living
- Mike Gregory - CISO, Community of Northwest Indiana
- Ryan Witt - Industry Practice Leader, Proofpoint
Mindset of the Financial Services CISO: Local Regulations, Global Threats
The Financial Services information protection landscape is constantly changing. Our threats are global, but our regulatory and compliance requirements are defined by local and national agencies. In this panel, senior security executives will come together to discuss regional regulatory pressures.
Speakers:
- Paul Ferrillo - Privacy & Cybersecurity Partner, Seyfarth Shaw, LLP
- Stephen Pecchia - Former Managing Director, Business Risk & Reliance, DTCC
- John Checco - Resident CISO, Proofpoint
Protecting People - Public Sector’s New Cyber Battle Ground
Cybercriminals know that people are the weak link in the cybersecurity chain. Government agencies must adapt to mitigate against this growing attack vector.
Our panel will discuss:
- Threats targeting federal agencies
- Controls to protect people and citizens
- Strategies to keep and safeguard users
Speakers:
- Michael Baker - CISO, General Dynamics IT
- Deborah Watson - Resident CISO, Proofpoint