for a Hybrid Workforce
Join Proofpoint and ISSA as we bring you a free cybersecurity eSummit to explore the biggest trends for 2021 so far and what you can do to stop threats in the new hybrid reality. Our top industry experts will discuss real-world examples and best practices for protecting your company’s most important assets: your people and your data.
Check out our agenda for the eSummit below:
9 am PT | 12 pm ET
|Keynote: People-Centric Cybersecurity in the New Normal|
|10 am PT | 1 pm ET||Session 2: Managing Insider Risk with a Hybrid Workforce|
|11 am PT | 2 pm ET||Live Demo: How People-Centric DLP Protects Your Data|
Keynote: People-Centric Cybersecurity in the New Normal
In cybersecurity, people are an organization’s last and most important line of defense. Whether it’s ransomware, email fraud, cloud account takeover or credential phishing, most attacks target a person before they target a technical flaw or network exploit.
Join experts Ryan Kalember, EVP of Cybersecurity Strategy and Sherrod Degrippo, Sr. Director of Threat Research, as they discuss the cyber threat landscape for 2021 so far. They will deep dive into:
- The latest cyber threat landscape trends
- How a people-centric approach can protect your organization
- Top resources to help support your security efforts
Managing Insider Risk with a Hybrid Workforce
After a year of remote work, we are beginning the return to “normalcy” in many places. But as the workforce shifts to a hybrid model, nothing will ever be quite the same. What is the impact on businesses as they race to rethink their security programs? How do they guard from external attacks and manage the challenge of insider risks – whether accidental or intentional?
Join our experts for a 45-minute session as they discuss key risk factors and how an insider threat management strategy can help your organization tackle these challenges. This session will cover:
- What the trend towards hybrid work means for organizations dependent on third-party users and supply chain vendors working outside of the company’s typical security controls
- How to share information in a way that protects against data loss without compromising employees’ ability to work efficiently and effectively
- What it takes to build to build a business case for an insider threat management program (ITMP) that you can sell to the C-Suite board
How People-Centric DLP Protects Your Data
Data doesn’t lose itself. People move it – whether due to negligence, a compromised account, or malicious in intent. With people everywhere and data everywhere, organizations with a hybrid workforce must understand how it creates new exposure to data risk.
Join us for a 30-minute live demo as our expert deep dives into:
- Key use cases to protect intellectual property, control oversharing in the cloud, and defend against external threats to your data
- Effective response for business impact, powered by people-centric visibility
- How to detect early warning signs of data risk well ahead of the exfiltration attempt
Executive Director of Technology and Chief Security Officer at PNM Resources
Spencer is accountable for the secure operations of enterprise IT and OT Infrastructure, Network and Telecommunications, Technology Innovation and the Cyber and Physical Security of the enterprise and the electric grid. In this role he strategically leads leaders to continuously improve operational effectiveness using a risk based approach to technology and security.
EVP of Cybersecurity Strategy at Proofpoint
With almost 20 years of professional experience in the information security industry, Ryan has provided cybersecurity counsel to global government delegations including Jordan, North Macedonia, Peru, and Spain. He also works with the National Governors Association and is a board member of the National Cyber Security Alliance and the Cybersecurity Technical Advisory Board
VP of Threat Research & Detection at Proofpoint
Sherrod is the VP of Threat Research and Detection leading a worldwide malware research team to advance Proofpoint threat intelligence and keep organizations safe from cyberattacks. Sherrod directs her 24/7/365 team to investigate advanced threats, deliver protections to customers daily, and create scalable threat intelligence solutions that integrate directly into Proofpoint products. Sherrod has been with Proofpoint for five years and has over fifteen years of information security experience.
Insider Threat Evangelist at Proofpoint
Brian comes to Proofpoint from Gartner where he focused on a wide variety of topics – cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP.
Global Cloud & Information Protection Director at Proofpoint
Mike is primarily focused on aligning Proofpoint’s strategy to customer priorities. Previous to this role Mike was Director of Advanced Technology for Proofpoint, where he led a global team focused on areas including cloud security/CASB, SASE, enterprise DLP, email fraud defense, SOAR, browser isolation, and security awareness training. Over the course of his career Mike has worked with some of the world’s largest companies and government agencies to drive innovation across a variety of technology disciplines including security, messaging, networking, and collaboration.