Wednesday, November 8, 2023 | 10:00AM-1:00PM CT

Chicago Marriott Suites O'Hare | 6155 N River Rd, Rosemont, IL 60018


In a new era of advanced security threats and compliance risks, one thing remains the same: attackers target people. And they are always evolving their techniques—growing broader, bolder, and more integrated over time. Now more than ever, cybersecurity leaders must be ready to break the attack chain.

Every cyber threat is unique, but most follow a general sequence of steps known as the attack chain. Understanding the modern attack chain—and how to disrupt it at every stage—can transform your security posture as threats evolve. Join us to learn about the latest attack trends and explore people-centric approaches to protecting people and defending data.

You’ll learn:

  • Why email remains a top vector for initial compromise
  • How attackers move laterally and escalate privilege in your environment
  • Where data loss occurs—inside and outside your organization



Claim Your Mini Drone for Attending!

We are excited to announce that we will be giving away a Mini Drone Foldable RC Quadcopter with a 4K HD Camera to the first 50 eligible attendees.


Agenda

  • 10:00AM-10:30AM
    Registration & Coffee Experience
  • 10:30AM-11:00AM
    Stop Email Attacks and Initial Compromise
  • 11:00AM-11:30PM
    Prevent Privilege Identity Escalation and Detect Lateral Movement
  • 11:30AM-12:00PM
    Defend Against Data Loss and Insider Threats
  • 12:00PM-1:00PM
    Lunch and Networking
  • 1:00PM
    Concludes

Featured Speakers

Brian Reed
Brian Reed | Sr. Director, Cybersecurity Strategy, Proofpoint, Inc

Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.

Mike Lee
Mike Lee | Product Management Director, Proofpoint, Inc

Mike Lee leads product management for Proofpoint’s Protection Threat Detection Systems, which focuses on the identification of email threats such as Business Email Compromise (BEC), Deception Threats such as Advanced Fee Fraud and Telephone Originated Attack Deceptions, Phish and Malware. Mike has led several key detection systems for Proofpoint, including the Supernova, Supernova Behavioral, Stateful Composite Scoring Service (SCSS), and MLX. Prior to Proofpoint, Mike led the development of Security & Identity services at PayPal, Yahoo and Visa.

Itay Nachum
Itay Nachum | Senior Director of Product Management, Proofpoint, Inc.

Itay Nachum, Senior Director of Product Management at Proofpoint, is an identity security subject matter expert, passionate technology evangelist, thought leader and public speaker. With 19+ years of experience in the cybersecurity space, he has played a pivotal role in driving product strategies, enhancing customer value and shaping global solution architecture across diverse startup and enterprise landscapes. Itay leads Proofpoint's Identity Threat Defense product line, spearheading technology innovation towards conquering identity security challenges.

Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.