COMING TO A CITY NEAR YOU!

Join us for an interactive workshop designed to help organizations combat data loss and insider risk. You’ll get an exclusive hands-on experience with Proofpoint products, hear best practices for protecting people and defending data, and learn how to detect, investigate, respond to and stop potential insider threats and data loss incidents.

Remote work, combined with cloud adoption and unprecedented employee turnover, has created a perfect storm for organizations trying to protect their most strategic and sensitive data. Insider threats are the top cybersecurity concern among CISOs globally. As the Data Loss Prevention (DLP) and Insider Threat Management (ITM) markets converge, a people-centric approach is required to fuel your cybersecurity strategy. The primary objective of both sets of technology is to prevent data loss, whether accidental or intentional, and misuse of data. DLP monitors email and file activity and leverages content scanning and behavioral analysis to determine whether users are handling sensitive data according to corporate policy. ITM monitors user activities such as application usage, user input/output, website access and file movement. It also captures screenshots of high-risk activity for visual evidence to accelerate investigations.

Join us at Proofpoint Discovery, where you’ll get hands-on experience with Proofpoint products. In this free workshop, you will learn:

  • Best practices on how to protect people and defend data.
  • How to detect and respond to potential insider threats.
  • How to investigate insider threat and data loss incidents.
  • How to prevent data loss through cloud sharing tools, personal webmail, removable media, and other common data transfer channels.
  • Participate in an engaging real-world investigation competition for the opportunity to win amazing prizes!

Earn Your Badge!

You'll receive this badge upon completion of the Proofpoint Discovery: Hands-on Lab - Combat Data Loss and Insider Risk, designed to help organizations combat data loss and insider risk.



des moines
February 27, 2024
DES MOINES, IA
omaha
April 16, 2024
OMAHA, NE
Kansas City
May 14, 2024
KANSAS CITY, MO
cleveland
June 11, 2024
CLEVELAND, OH
philadelphia
March 12, 2024
KING OF PRUSSIA, PA
edmonton
October 18, 2023
EDMONTON, AB
Vancouver
May 10, 2023
VANCOUVER, BC
Halifax
June 14, 2023
HALIFAX, NS
Montreal
May 31, 2023
MONTREAL, QC
toronto
September 13, 2023
TORONTO, ON
Monterrey
May 2, 2023
MONTERREY, MX
Mexico City
May 4, 2023
MEXICO CITY, MX
Brasilia
May 9, 2023
BRASILIA, BR
Sao Paulo
May 11, 2023
SÃO PAULO, BR
belo horizonte
August 1, 2023
BELO HORIZONTE, BR
bogota
October 3, 2023
BOGOTÁ, CO
Santiago
August 22, 2023
SANTIAGO, CL
Rio de Janeiro
August 31, 2023
RIO DE JANEIRO, BR
lima
November 28, 2023
LIMA, PE

Who Should Attend

This event is suitable for information security decision-makers, including: Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.