Proofpoint


Beers with

Engineers


Zoom Meeting | Tuesday, June 30, 2020 | 4:00PM-5:00PM ET

This interactive virtual meeting will bring together local engineers and threat researchers to review the current threat landscape and hear why Proofpoint and Okta have teamed up to provide best-of-breed identity and email security to help security and IT teams defend people-centric attacks. You’ll have the opportunity to discuss your security-related questions with your peers and Proofpoint and Okta technical experts.

Crack open a cold one, and join Proofpoint, Okta, and your peers for a beer while we discuss:

  • Cyber Threat Updates: COVID-19 Lures
  • Threat hunting and researching using the TAP Console
  • Applying adaptive policy controls in Okta Identity Cloud

As a thank you, each attendee will receive a happy hour-style gift box provided by Craftom.io.

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks. www.isc2.org

NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Agenda

4:00PM-4:05PM
Welcome & Introductions
4:05PM-4:20PM
Cyber Threat Updates: COVID-19 Lures
4:20PM-4:35PM
Threat Hunting and Researching using the TAP Console
4:35PM-4:50PM
Applying adaptive policy controls in Okta Identity Cloud
4:50PM-5:00PM
Q&A

Who Should Attend

This event is suitable for mid-level information security management (IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

Featured Speaker

Danny Howerton, Senior Threat Analyst, Proofpoint, Inc.

Danny Howerton is a Sr. Threat Analyst at Proofpoint where his team is constantly viewing, analyzing, and researching the threat data that is produced from the Proofpoint Targeted Attack Protection (TAP) service. Howerton and his team monitor and track global malware trends, distribution trends and techniques, malicious lures, malware campaigns, and actors while also finding new ways to look at and ingest the TAP data.
© 2020 All Rights Reserved. Privacy Policy