WEBINAR:

Maximise Your Security Investment

Zoom | Thursday, 12 December 2024 | 9:30AM SGT | 12:30PM AEDT


Join us for an exclusive virtual event where we'll showcase the latest updates and innovations we've made to Proofpoint People Protection over the past quarter. You'll connect with product experts to get an insider's look at new capabilities and learn how they can better secure your organisation from cyber threats.

At Proofpoint Innovations: Protect People, we'll discuss:

  • Risk Explorer
  • Threat Protection
  • Behavioural AI
  • Security Awareness


Don't miss this opportunity to stay ahead of the threat landscape, optimise your security investment, and protect your organisation from potential attacks!




SPEAKERS


Jennifer_Cheng1.jpg
Jennifer Cheng | Cybersecurity Strategy Leader APJ at Proofpoint 

Jennifer Cheng is the Cybersecurity Strategy Leader at Proofpoint for Asia Pacific and Japan. She has over 15 years of experience consulting and educating IT professionals on new technologies, best practices, and industry trends. Prior to Proofpoint, Jennifer held business and technical roles at Cisco, Salesforce, and WatchDox. She has a B.S.E. degree in Computer Science from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.


Paul thomas
Paul Thomas | Senior Sales Engineer, SE Asia and Korea at Proofpoint

Paul is a battle-hardened cybersecurity professional with over two decades of industry experience. Starting his career in Support operations, Paul has held multiple roles within the Email security space including successfully building an Engineering team in Asia that focused on Email Threat Detection. He now applies his extensive technical knowledge and skills to assist companies deploy industry best practices to secure their users and digital assets. Outside work, he has a keen interest in all things aviation-related.



Zoom | Wednesday, 28 August 2024 | 9:30AM SGT | 11:30AM AEST

The Human-Centric Security Imperative


At Proofpoint, we’ve long championed human-centric cybersecurity as a critical priority for infosec teams. As traditional security controls struggle more than ever with modern threats, the broader industry is finally coming around to the idea. But what does human-centric look like in practice? In this session, we’’ll explore the ins-and-outs of putting people at the centre of your cyber defences. Hear about the four principal categories of human-based risks – threats, impersonation. Identity and data loss – and the best approach for proactively addressing each holistically.

Join this Power Series as our panel of experts discuss:

  • Why human-centric security is a game-changer for security teams
  • How and where to deploy AI most effectively
  • The surprising synergies between threat protection and DLP

Boomerang Backpack



Get Your Power Series Gift!

After the event, we’ll be giving away a Proofpoint Vacuum Flask to the first 150 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

For New Zealand residents only, please indicate if you would like to support the New Zealand Conservation Trust’s work to protect and advocate for New Zealand’s unique taonga.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Nate Chessin_180.jpg
Nate Chessin | SVP, Worldwide Sales Engineering at Proofpoint, Inc.

Nate Chessin is a 20 year technology and sales professional with extensive leadership and technical sales experience. Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures. Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE #12034.


catherinehwang.jpg
Cat Hwang | Sr. Director, Product Marketing at Proofpoint

Catherine Hwang is a Sr. Director of Product Marketing at Proofpoint, where she drives product marketing strategy for cloud app security, information protection, and compliance. Hwang has been with Proofpoint for over 3 years. Prior to joining Proofpoint, she has held a variety of strategic and technical roles at companies such as McAfee and Mercury (acquired by Hewlett-Packard). Hwang has a degree in Computer Engineering degree from the University of Michigan.


Cheryl_Tang.jpg
Cheryl Tang | Sr. Director, Product Marketing at Proofpoint

Cheryl Tang leads product marketing for Core Email Security solutions at Proofpoint. She brings over 20 years of product marketing experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product marketing and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.


jasminewu.jpg
Jasmine Wu | Sr. Director, Product Marketing at Proofpoint

Jasmine Wu is the Senior Director of Product Marketing and Head of GTM Operations at Proofpoint. She has over 15+ years of experience providing thought leadership and advisory in the emerging technologies space, including cloud collaboration, corporate risk protection, information governance, and digital transformation.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises organisations. This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are £50 value. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift, you represent and warrant that your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.

Zoom | Thursday, 26 September 2024 | 9:30AM SGT | 11:30AM AEST

Defending Data in the Age of AI


Generative AI presents a clear opportunity to accelerate innovation. According to the McKinsey Global Survey, 25% of C-suite executives are personally using GenAI tools for work.
In this session, our experts will explore how to enable safe adoption of GenAI and how it is already driving the use of AI tools in data loss prevention.

Join this Power Series as our panel of experts discuss:

  • How GenAI is used and presents risk to data
  • How to monitor and control the use of GenAI
  • How AI tools can help you defend your data

Bluetooth Speaker



Get Your Power Series Gift!

After the event, we’ll be giving away a Proofpoint Bluetooth Speaker* to the first 150 qualified attendees who place an order.

For Australian residents, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

​For New Zealand residents, please indicate if you like to support NZ Conservation Programmes, in lieu of the gift.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Jennifer_Cheng1.jpg
Jennifer Cheng | Cybersecurity Strategy Leader APJ at Proofpoint 

Jennifer Cheng is the Cybersecurity Strategy Leader at Proofpoint for Asia Pacific and Japan. She has over 15 years of experience consulting and educating IT professionals on new technologies, best practices, and industry trends. Prior to Proofpoint, Jennifer held business and technical roles at Cisco, Salesforce, and WatchDox. She has a B.S.E. degree in Computer Science from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.


Nate Chessin_180.jpg
Itir Clarke | Product Marketing Manager at Proofpoint, Inc.

Itir Clarke is a Staff Product Marketing Manager for Proofpoint's Information and Cloud Security solutions. Before joining Proofpoint, Itir worked on data center products at Cisco, Brocade and Sun Microsystems. Itir has over 20 years of information technology experience in OEM Marketing, Product Marketing and Management roles. Her responsibilities at Proofpoint include positioning and messaging of our Information Protection solutions, evangelizing our people-centric approach to Enterprise Data Loss Prevention, blogging about cloud and insider threats, definition and execution of campaigns and promotions, and sales enablement. In her role as a Sr. Product Marketing Manager, she works closely with product management, threat research, and corporate marketing to bring new DLP, insider threat management and managed services capabilities to the Information Protection market. She also collaborates with analyst firms on market research projects, conducting surveys to develop educational reports on data security and insider threat management trends and customer requirements. Itir has significant experience at communicating technical and strategic vision to customer, sales and analyst organizations.


Matt Patterson
Matt Patterson | Solutions Architect: Information Protection, APJ at Proofpoint

Matt Patterson is a Technical Solutions Architect covering Information Protection at Proofpoint for Asia Pacific and Japan. Matt has worked in Cyber Security for the last 20 years. He has been a Security Analyst in large enterprise, a Security Engineer in high-tech and IoT environments, and most recently as a vendor Sales Engineer and Specialist for endpoint, cloud and data security. Here at Proofpoint, Matt is the technical expert for all things Information Protection enabling our customers to get the best outcomes from the platform.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises organisations. This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are £50 value. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift, you represent and warrant that your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.

Zoom | Thursday, 25 July 2024 | 9:30AM SGT | 11:30AM AEST

Behind the Scenes with Threat Research


One of the most common questions we get is “what does a day in the life of a cyber threat researcher look like?” Here’s your chance to find out directly from the team that goes toe-to-toe with threat actors every day. Learn how our researchers discover and disrupt cyberattacks, analyse threat actors and campaigns, and deliver industry-leading threat intelligence for human-centric security that protects customers and the wider cybersecurity community.

The Proofpoint Threat Research team comprises industry experts covering everything in the threat landscape—from BEC to MFA phish kits to novel malware loaders to QR-code phishing.

Join this Power Series as we discuss:

  • Threats that keep us up at night
  • Career paths to cybersecurity
  • What does Proofpoint do with our research?
  • Surprises from the threat landscape


skull beanie



Get Your Power Series Gift!

After the event, we’ll be giving away a Proofpoint Skull Beanie * to the first 150 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

For New Zealand residents only, please indicate if you would like to support the New Zealand Conservation Trust’s work to protect and advocate for New Zealand’s unique taonga.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Ryan-Kalember-2023.png
Ryan Kalember | EVP Cybersecurity Strategy at Proofpoint 

With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.


Daniel Blackford.jpg
Daniel Blackford | Snr Manager, Threat Research at Proofpoint

Formerly a researcher himself, Daniel currently leads Proofpoint's threat research team devoted to tracking financially-motivated actors. From high-profile botnets to credential harvesting and business email compromise, Daniel's team is in the weeds everyday leveraging Proofpoint's world class visibility to make high-confidence attributions and to share their findings with defenders across the world. Prior to his work at Proofpoint, Daniel worked as a malware analyst at the NCFTA and got his start tracking adversaries as a combat engineer with the US Army.


Alexis
Alexis Dorais-Joncas | Sr. Manager, Threat Research at Proofpoint

Alexis Dorais-Joncas is the Senior Manager of Proofpoint’s APT research team, where he and his team of threat researchers and intelligence analysts focus on tracking the most elusive state-sponsored threat actors and ensuring Proofpoint customers are protected against these persistent attackers. Prior to joining Proofpoint, Alexis led ESET’s Montreal-based R&D branch office for over 10 years, where his team focused on malware research, network security and targeted attacks tracking. Alexis is an established speaker on current cyberthreats, having spoken in front of diverse audiences at events such as Northsec, Bluehat, Botconf, First CTI, Sector and Rightscon. He has also been quoted in several security and technical media such as Wired, ITWorldCanada and Ars Technica, with broadcast appearances on Radio-Canada and Skynews. Alexis holds an M. Sc. in Electrical Engineering from the University of Sherbrooke in Canada.


SarahSabotka.jpg
Sarah Sabotka | Sr. Threat Researcher at Proofpoint

Sarah Sabotka is a Senior Threat Researcher on the Threat Research Team at Proofpoint where she focuses on commodity crimeware campaigns and communicating the threat landscape to customers and the public. Sarah had her start by doing OSINT collection, case development, and law enforcement collaboration to support animal cruelty investigations for an international animal welfare organization. Prior to joining Proofpoint, Sarah spent over four years developing and leading the Global Cyber Threat Intelligence team at Experian, where she was also responsible for leading brand monitoring, threat hunting, vulnerability intelligence, and ad-hoc incident response activities; before that she was a Senior Threat Analyst at Goldman Sachs. Sarah earned her B.A. in English from the University of Connecticut (Storrs), and her M.S. in Cybersecurity from Utica College. She resides in southern New Hampshire where she runs a 501(c)3 animal rescue and sanctuary with her husband, home to 14 rescue dogs and four rescue fish.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, India, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.

Zoom | Wednesday, 28 August 2024 | 9:30AM SGT | 11:30AM AEST

The Human-Centric Security Imperative


At Proofpoint, we’ve long championed human-centric cybersecurity as a critical priority for infosec teams. As traditional security controls struggle more than ever with modern threats, the broader industry is finally coming around to the idea. But what does human-centric look like in practice? In this session, we’’ll explore the ins-and-outs of putting people at the centre of your cyber defences. Hear about the four principal categories of human-based risks – threats, impersonation. Identity and data loss – and the best approach for proactively addressing each holistically.

Join this Power Series as our panel of experts discuss:

  • Why human-centric security is a game-changer for security teams
  • How and where to deploy AI most effectively
  • The surprising synergies between threat protection and DLP

Boomerang Backpack



Get Your Power Series Gift!

After the event, we’ll be giving away a Proofpoint Vacuum Flask to the first 150 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

For New Zealand residents only, please indicate if you would like to support the New Zealand Conservation Trust’s work to protect and advocate for New Zealand’s unique taonga.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKER


Jennifer_Cheng1.jpg
Jennifer Cheng | Cybersecurity Strategy Leader APJ at Proofpoint 

Jennifer Cheng is the Cybersecurity Strategy Leader at Proofpoint for Asia Pacific and Japan. She has over 15 years of experience consulting and educating IT professionals on new technologies, best practices, and industry trends. Prior to Proofpoint, Jennifer held business and technical roles at Cisco, Salesforce, and WatchDox. She has a B.S.E. degree in Computer Science from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.


Nate Chessin_180.jpg
Nate Chessin | SVP, Worldwide Sales Engineering at Proofpoint, Inc.

Nate Chessin is a 20 year technology and sales professional with extensive leadership and technical sales experience. Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures. Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE #12034.


catherinehwang.jpg
Cat Hwang | Sr. Director, Product Marketing at Proofpoint

Catherine Hwang is a Sr. Director of Product Marketing at Proofpoint, where she drives product marketing strategy for cloud app security, information protection, and compliance. Hwang has been with Proofpoint for over 3 years. Prior to joining Proofpoint, she has held a variety of strategic and technical roles at companies such as McAfee and Mercury (acquired by Hewlett-Packard). Hwang has a degree in Computer Engineering degree from the University of Michigan.


Cheryl_Tang.jpg
Cheryl Tang | Sr. Director, Product Marketing at Proofpoint

Cheryl Tang leads product marketing for Core Email Security solutions at Proofpoint. She brings over 20 years of product marketing experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product marketing and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.


jasminewu.jpg
Jasmine Wu | Sr. Director, Product Marketing at Proofpoint

Jasmine Wu is the Senior Director of Product Marketing and Head of GTM Operations at Proofpoint. She has over 15+ years of experience providing thought leadership and advisory in the emerging technologies space, including cloud collaboration, corporate risk protection, information governance, and digital transformation.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises organisations. This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are £50 value. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift, you represent and warrant that your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.


AI Solutions to Human-Centric Risks

Large-scale data breaches continue to dominate headlines while threat actors continue to adapt their craft with blinding speed. Against this challenging backdrop for organisations, one constant remains: humans and their identities are the most targeted links in the attack chain.

Ensuring your organisation is well protected requires defenders to adopt proactive and adaptive strategies, using the latest in innovative technologies to stay ahead of these sophisticated and evolving threats.

Watch us highlight the latest updates and innovations in Proofpoint Threat Protection. We explore our continued innovation in GenAI and how Proofpoint combines threat intelligence with AI-driven detection to understand and provide complete and constantly evolving protection against a wide range of external threats.


Control Data Loss with Dynamic Policies and Conditional Rules

In our APAC Innovations Webinar, we showcase the latest updates and innovations we've made to Proofpoint People Protection over the past quarter. Connect with our experts to get an insider's look at new capabilities that will help you proactively protect sensitive data across all channels by analysing user behaviour and content.


Maximise Your Security Investment

In our APAC Innovations Webinar, we showcase the latest updates and innovations we've made to Proofpoint People Protection over the past quarter. Our product experts give you an insider's look at new capabilities and learn how they can better secure your organisation from cyber threats.

(ISC)2 CPE Logo

Earn ISC2 CPE Credit

This event is approved and endorsed by ISC2. CPE credits will automatically be accredited to your member account within four to six weeks.

Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.