This event has already taken place. Please visit proofpoint.com/events for upcoming events near you.


Remote work, combined with cloud adoption and unprecedented employee turnover, has created a perfect storm for organizations trying to protect their most strategic and sensitive data. Insider threats are the top cybersecurity concern among CISOs globally. As the Data Loss Prevention (DLP) and Insider Threat Management (ITM) markets converge, a people-centric approach is required to fuel your cybersecurity strategy. The primary objective of both sets of technology is to prevent data loss, whether accidental or intentional, and misuse of data. DLP monitors email and file activity and leverages content scanning and behavioral analysis to determine whether users are handling sensitive data according to corporate policy. ITM monitors user activities such as application usage, user input/output, website access and file movement. It also captures screenshots of high-risk activity for visual evidence to accelerate investigations.

Join us at Proofpoint Discovery, where you’ll get hands-on experience with Proofpoint products. In this free workshop, you will learn:

  • Best practices on how to protect people and defend data.
  • How to detect and respond to potential insider threats.
  • How to investigate insider threat and data loss incidents.
  • How to prevent data loss through cloud sharing tools, personal webmail, removable media, and other common data transfer channels.
  • Participate in an engaging real-world investigation competition for the opportunity to win amazing prizes!

Earn Your Badge!

You'll receive this badge upon completion of the Proofpoint Discovery: Hands-on Lab - Combat Data Loss and Insider Risk, designed to help organizations combat data loss and insider risk.



Agenda

  • 8:00AM-9:00AM
    Registration and Networking Breakfast
  • 9:00AM-9:15AM
    Stopping Email Exfiltration with Behavioral AI
  • 9:15AM-9:30AM
    How to Stop Email Exfiltration with Behavioral AI [Demo]
  • 9:30AM-10:00AM
    Betrayal from Within - How to Combat Insider Risk
  • 10:00AM-12:00PM
    Lab Exercises and Q&A

Who Should Attend

This event is suitable for information security decision-makers, including: Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.