Cybersecurity Leadership Certification

Proofpoint Certified DLP Specialist

DLP Badge

Fridays on September 16th, 23rd & 30th | 10-11 am PT | 1-2 pm ET

Enrollment to become a Proofpoint Certified DLP Specialist has now closed.

Data doesn't move itself. People—whether they are negligent, compromised or malicious—move data in secure and risky ways. The shift to remote and hybrid has complicated the picture by widening the vulnerability and attack surface. So how do you secure your sensitive data?  

Our Certified DLP Specialist program is designed to train you on the latest trends and insights of data loss prevention and how Proofpoint’s people-centric approach can help you better protect your company. 

Becoming certified is easy. Just register and attend the three 1 hour courses listed below, pass the exam at the end of each course, and earn your certification!

*This track is intended for all levels of cybersecurity administration roles. These are NOT technical training sessions. For product or solution-specific education, please visit our web-based accreditation and instructor-led technical coursesAll courses are eligible for CPE credits through ISC(2).


Friday, September 16th

10 am PT | 1pm ET

Data Loss Prevention 101

Friday, September 23rd

10 am PT | 1 pm ET

Shortfalls of Legacy DLP and How to Modernize Your DLP Program

Friday, September 30th

10 am PT | 1pm ET

Common DLP Use Cases in a Work from Anywhere World

Course 1

Data Loss Prevention 101

Alongside widespread adoption of work-from-anywhere and cloud computing, data breaches are increasing in frequency. This makes data security a major concern. With data expected to grow at 23%* a year, automation is key if security teams are to keep up.  

In this session, our instructors will take you back to the basics of data loss prevention (DLP). Join us for the first course as we brush up on:  

  • What is DLP? Why DLP?
  • Tools for monitoring riskiest data loss channels
  • Techniques used in detecting different types of data
  • Latest and greatest of data controls

*Accenture. “The State of Cybersecurity Resilience 2021.” November 2021. 

Enroll Now

Course 2

Shortfalls of Legacy DLP and How to Modernize Your DLP Program

In a work-from-anywhere world, data loss prevention requires a people-centric approach.  Unfortunately, network and data-centric solutions are not up to the task.  Modern DLP solutions must provide visibility to negligent, compromised and malicious user scenarios and address all key channels of data loss.  They must scale with your company’s information protection needs, protect data without interruption, and be built with privacy-by-design in mind. 

Join us for the second course to learn:  

  • Challenges with legacy on-premises DLP 
  • What to look for and how to build a people-centric DLP solution 
  • Why you need a cloud-native multi-channel DLP solution 

Enroll Now

Course 3

Common DLP Use Cases in a Work from Anywhere World

With the pandemic, the pace of digital transformation accelerated. Work habits changed. Messaging on Teams or Slack replaced water cooler conversations. In addition to email, documents are being shared via the cloud applications such as SharePoint and Box. As a result, data has left the corporate perimeter and now resides everywhere.  So data loss prevention (DLP) practices must also change and follow the data and the users more effectively.  

Join us for the third and last course to learn about:  

  • Top DLP use cases for the riskiest data loss channels 
  • Architecture of choice for each use case 
  • How to fine tune DLP policy rules 
  • How to measure success 

Enroll Now


There are some questions:
  • What if I am unable to attend one of the live sessions?

    If you are unable to attend a live session, you may watch the recording and take the exam by October 14th. All live sessions will be recorded, and you may access the videos from an email that will be sent soon!

  • What is considered a passing grade for each course?

    To pass a course, you would have to attend the session either live or watch on-demand and take the exam at the end of the course. You need to score 100% on each exam to pass the course.

  • How many times can I retake the exams?

    You have unlimited attempts to take the exams to get 100% scores to pass the courses.

  • How long will the recordings and exams be available for me to access?

    You will have until October 14th, 5PM PST, 2022 to access the course recordings and exams to complete your certification.

  • How long is each course?

    Each course is about 1 hour long. 

  • How much does the certification cost?

    The courses and certification is free.

  • Do I need to watch all three sessions?

    Yes. You are required to watch all three sessions (either on-demand or live) to be eligible for your certification in addition to passing all of your exams. 

  • When will I receive my exam link?

    After you have watched the session (live or on demand), you will receive an email within 1-3 business days after the live session, with the exam link.

Course Instructors

Jeremy Wittkop

Senior Director of Technology Services

Jeremy Wittkop is an expert in architecting, implementing, and managing Information Protection programs with a focus on helping multinational organizations comply with a changing regulatory landscape and protecting their most sensitive Intellectual Property.  Jeremy is a trusted information protection thought leader -- published author, blogger, public speaker, and advisor to clients, technology entrepreneurs, and public and private equity investors. At Proofpoint, Jeremy plays a senior role interfacing with our largest, most complex clients. Prior to Proofpoint, Jeremy spent nearly 10 years with Intelisecure until it was acquired by Proofpoint.

Alin Mutu

Director, Product Management

Alin Mutu is a seasoned cyber-security professional who spent his entire career architecting, implementing, managing, supporting and actively guiding customers through multi-faceted information protection programs. His focus on helping very large multinational organizations navigate an ever changing regulatory landscape and protect their most sensitive intellectual property provided him with unique insights into the practical application of technology in solving complex business environments. In his current role, he is a foundational architect of Proofpoint’s internationally recognized data loss prevention, insider threat management with advanced user and entity behavior, cutting-edge cloud security, and unified analytics services.

Nirav Shah

Principal Product Manager, ITM

Nirav Shah is a product management leader for Proofpoint's insider threat and DLP product line.  Prior to Proofpoint, he led the SASE (Secure Access Service Edge) initiative at Forcepoint to help accelerate digital transformation of distributed enterprises.  During his career, Nirav has held product management, engineering leadership, and technical roles in large networking & security companies as well as venture-backed startups.  His domain experience includes areas of network & cloud security, security analytics, and MSSP deployments.

Itir Clarke

Manager, Product Marketing, Information and Cloud Security

Itir Clarke is a Manager, Product Marketing for Proofpoint's Information and Cloud Security solutions. Before joining Proofpoint, Itir worked on data center products at Cisco, Brocade and Sun Microsystems. Itir has over 20 years of information technology experience in OEM Marketing, Product Marketing and Management roles. Her responsibilities at Proofpoint include positioning and messaging of our Information Protection solutions, evangelizing our people-centric approach to Enterprise Data Loss Prevention, blogging about cloud and insider threats, definition and execution of campaigns and promotions, and sales enablement.