Protect 2020 Information Protection Sessions

Best Practices: Building an Information Protection Program

Best Practices: Building an Information Protection Program

Protecting your companies data is critical, but are you challenged with where you start? Proofpoint can share our experiences of working with thousands of customers on how best to build an Information Protection Program.

Speakers:

  • Justin Collins, Senior Director of Professional Services, Proofpoint
  • Matt Lyle, Professional Services Architect, Proofpoint
Watch Now
   
Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Best Practices: Detecting, Notifying, and Alerting on Account Compromise

Proofpoint has a wide product suite to help detect, notify and alert if you have an account compromise - the one-step for an attacker to get access to email, files and collaboration tools. Learn how to use IMD, CAD, CASB, ITM, DLP, and Email Protection solutions from Proofpoint to identify compromised accounts in your environment.

Speakers:

  • Justin Collins, Senior Director of Professional Services, Proofpoint
  • Jessica Greer, Director of Professional Services, Proofpoint
Watch Now
   
Best Practices: Office 365 Security with Proofpoint

Best Practices: Office 365 Security with Proofpoint

As organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization.

Speakers:

  • Michael Beninda, Principal Consultant - Professional Services, Proofpoint
  • James Knight, Principal Consultant - Professional Services, Proofpoint
Watch Now
   
Deep Dive: The Future of People-Centric Information Protection

Deep Dive: The Future of People-Centric Information Protection

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

  • Tim Choi, VP, Product Marketing, Proofpoint
  • Alex Kremer, VP, Chief Architect, Proofpoint
Watch Now
   
Modern Approaches to Information Protection, Privacy and Cloud Security

Modern Approaches to Information Protection, Privacy and Cloud Security

DLP and CASB are two of the most frustrating technologies on the market, yet every organization needs to implement cloud security and protect their data. Join us for this interactive session to learn about more modern approaches to these challenges.

Speakers:

  • Lucia Milica, Global Resident CISO, Proofpoint
  • Mike Stacy, Sr. Director of Advanced Technologies, Proofpoint
Watch Now
   
Introducing the Next Generation of People-Centric Insider Threat Management Technology

Introducing the Next Generation of People-Centric Insider Threat Management Technology

Proofpoint acquired ObserveIT Insider Threat Management (ITM) in 2019 – now called Proofpoint ITM. New innovations in 2020 include enhanced insider threat detection, incident response workflow, and scalable SaaS deployments. Learn how this solution addresses the unique challenges of insider threat.

Speaker:

  • Mayank Choudhary, SVP for Products of Insider Threat Management, Proofpoint
Watch Now
   
Panel discussion: The Evolution of the Insider Threat

Panel discussion: The Evolution of the Insider Threat

Building practical, technology enabled insider threat management programs is a critical challenge for modern cybersecurity organizations. Learn from this panel of experts discussing trends, best practices, and integrated technology solutions related to insider threat management.

Speakers:

  • Stacey Champagne, Insider Threat Investigations Lead, PayPal
  • Gary Hayslip, CISO, Softbank Investment Advisors
  • Rob Oden, Cybersecurity Architect, L3 Harris
  • Mike McKee, EVP and GM for Insider Threat Management, Proofpoint
Watch Now
   
Practitioner Strategies for the Work From Home Enterprise

Practitioner Strategies for the Work From Home Enterprise

The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint customers sharing their stories and strategies related to their experience adapting to the new normal of work from home.

Speakers:

  • Matt Lyle, Professional Services Architect, Proofpoint
  • Mike Olden, Principal Consultant, Proofpoint
Watch Now
   
Protecting Your Cloud Data with Proofpoint CASB

Protecting Your Cloud Data with Proofpoint CASB

The campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack.

Speakers:

  • Brian Tschinkel, CISO, Higher Education
  • Sonja Hammond, VP, Chief Information Security Officer, National Veterinary Associates
  • Itir Clarke, Sr. Product Marketing Manager, Proofpoint
Watch Now
   
Technology Strategies to Better Secure the All-Remote Enterprise

Technology Strategies to Better Secure the All-Remote Enterprise

The rapid shift to remote work put enormous strain on organizations and security teams to protect users and valuable data while maintaining user productivity. Join this panel of Proofpoint product strategists to learn about the spectrum of technologies that security teams can lean on to adapt to the new normal of work from home.

Speakers:

  • Lucia Milica, Global Resident CISO, Proofpoint
  • J.C. Checco, Resident CISO, Proofpoint
Watch Now
   
The New Blue Print: The Future of People-Centric Information Protection

The New Blue Print: The Future of People-Centric Information Protection

A people-centric approach changes the game when it comes to protecting your data. Come hear about Proofpoint's strategy for Enterprise DLP and Insider Threat Management. Learn how this approach is sustainable, risk-relevant and cost effective - and keeps your employees productive in a cloud-based Work From Home era.

Speakers:

  • David Knight, EVP and GM of Cloud Security Group, Proofpoint
  • Mayank Choudhary, SVP of Product, Insider Threat Management, Proofpoint
Watch Now