You're invited


Cybersecurity Best Practices

Zoom | Thursday, September 7, 2023 | 11:00AM-12:00PM CT


Join us for Proofpoint Cybersecurity Best Practices: Healthcare

Healthcare data is uniquely sensitive and highly regulated. That makes it both a security and compliance issue. Attackers have intensified their efforts to gain valuable data, protected health information (PHI) and financial data. And for their part, healthcare institutions are expanding their attack surface by moving to the cloud and letting more employees and patients log in remotely. These institutions also face increased risk from both malicious and well-intentioned insiders. Proofpoint provides a people-centric approach to safeguard sensitive data in widely distributed healthcare networks. Our information protection solutions are easy to deploy and maintain. We help you defend your people and their sensitive data against accidental mistakes, attacks and insider risk. Our protective shield extends across cloud services, email, endpoint and on-premises file shares.

Join us to learn:

  • Today's biggest healthcare threats—and how you can manage them
  • Essential cybersecurity best practices for healthcare
  • Recommended configurations, processes, and policies

Agenda

  • 11:00AM-11:10AM
    Welcome and introductions
  • 11:10AM-11:50AM
    Proofpoint Presentation
  • 11:50AM-12:00PM
    Q&A

Featured Speakers

Jeff Vogt
James Stroud | Sr. Sales Engineering Manager, Proofpoint, Inc

James Stroud is the Sr. Sales Engineering Manager for Proofpoint’s South and East Mid Market teams. He has 25+ years of experience in Cyber Security, providing leadership and expertise for companies in various sectors, including Federal, State and Local Government, Healthcare and Education. James joined Proofpoint this year after serving as the Global category lead for security at AWS. James holds several industry certifications from AWS, Cisco, and Microsoft.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.