VIRTUAL
The best way to protect and defend against today’s cyber attackers is to know your enemy.
In the first event in this three-part series, we’ll look at how the shift to working from home has cyber attackers more active than ever. With research insights from Proofpoint: State of the Phish and CyberArk: Protecting Privileged Access, you’ll have what you need to proactively and confidently evolve your approach to a Zero-Trust model that effectively thwarts cyber attackers.
Discover how to take action and make all the right moves to:
Join Proofpoint and CyberArk for the blockbuster insights, tools and next steps you need to take a people-centric approach to protecting privileged users from today’s most severe threats.
Ready to play a leading role in the fight against cyber threats? Reserve your seat today!
We’re sending you your favorite movie munchies to enjoy during your own action-packed movie night at home! This event’s Movie Night Snack Pack* will include a $20 Amazon Gift Card (for early access movie streaming) and Béquet Celtic Sea Salt Caramel Gift Bag. Movie Night Snack Packs are only available to qualified attendees in the U.S. or Canada.
*If you cannot accept or wish not to accept the Movie Night Snack Pack, please make sure to decline upon registering.
Brett Shaw is a Sr. Product Marketing Manager, educating our customers and staff on current threat landscape trends and security best practices. Brett has 10 years of experience helping IT professionals develop best practices with new technologies and keep pace with the evolving landscape. Brett earned his M.B.A from Weber State University.
Corey O’Connor is the Director of Product Marketing at CyberArk responsible for all Privileged Access Management solutions within the Identity Security portfolio. His experience through multiple product marketing roles both in security and data storage and management enables him to have a strong understanding of the continuous changes in privileged access security.
You need to protect your people. Their identities are at risk. And that means your organization is, too. Cyber criminals are leveraging people-centric tactics to compromise the identity of your users – ultimately to exfiltrate data and disrupt business. In the second event in this three-part series, you’ll gain insights into why a people-centric approach to security can stop them.
You can take action and make all the right moves by learning how:
Join Proofpoint and CyberArk for the blockbuster insights, tools and next steps you need to take a people-centric approach to protecting privileged users from today’s most severe threats.
Ready to play a leading role in the fight against cyber threats? Reserve your seat today!
We’re sending you your favorite movie munchies to enjoy during your own action-packed movie night at home! This event’s Movie Night Snack Pack* will include a One Gallon Popcorn Trio Tin (Butter, Cheddar Cheese and Caramel). Movie Night Snack Packs are only available to qualified attendees in the U.S. or Canada.
*If you cannot accept or wish not to accept the Movie Night Snack Pack, please make sure to decline upon registering.
Harsh Doshi is a Staff Product Manager at Proofpoint, in this role he is responsible for developing partner integrations and new solutions. Harsh has 10 years of experience developing cybersecurity products and services. Harsh has earned his Bachelor of Science from Virginia Tech.
Len Noe is a Global Sales Engineer and White Hat Hacker for CyberArk Software. He, along with his team, help CyberArk customers build new integrations and use cases. Len is an international security speaker who has presented in over 20 countries and at multiple major security conferences worldwide. Prior to 2001 Len was a Black/Grey Hat Hacker and learned most of his skills by practical application. Noe has spent 20 years in the areas of web development, system engineering / administration, architecture, coding. Len is one of the drivers behind CyberArk’s Attack & Defend Series as the resident RedTeam leader. Len is also a speaker at this years RSA Virtual Experience, speaking about the dangers of augmented humans as an attack vector. He also actively participates in the activities of the Information Security communities in Texas, the Autism Society, and many others.
No matter the size of your organization, threat actors are aiming advanced threats at one of your most critical resources: your workforce. In the final event in this three-part series, we’ll go behind the scenes to hear real stories about how today’s attacks target people using ransomware, email fraud and credential phishing to compromise organizations. In fact, a recent study by Verizon shows that 85% of all breaches require human involvement.
Join us to learn:
Join Proofpoint and CyberArk for the blockbuster insights, tools and next steps you need to take a people-centric approach to protecting privileged users from today’s most severe threats.
Ready to play a leading role in the fight against cyber threats? Reserve your seat today!
We’re sending you your favorite movie munchies to enjoy during your own action-packed movie night at home! This event’s Movie Night Snack Pack* will include a Dylan’s Candy Bar Trio Tin (Red Swedish Fish, Mini Gummy Bears, and Sour Patch Kids). Movie Night Snack Packs are only available to qualified attendees** in the U.S. or Canada.
*If you cannot accept or wish not to accept the Movie Night Snack Pack, please make sure to decline upon registering.
Christopher Dawson has spent years in the cybersecurity industry, focused on educating the infosec community and the public on threats, best practices, and the latest research. From his early days in academia to his current work as a Threat Intelligence Lead with Proofpoint, Chris has published and spoken extensively on a range of IT and security issues.
Andy Thompson is part of the Research Labs Division at CyberArk. This is the team within CyberArk that does ongoing research into offensive technology and information security trends. Before joining CyberArk 5 years ago, Andy spent his time in the trenches as a Senior Systems Admin and Security Engineer. He’s worked IT and Security with large hospitals, movie theater chains, bars and restaurants, other service industries, as well as global retail organizations.
This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organizations. It is also suitable for compliance decision-makers, including: General Counsel, Chief Compliance or Privacy Officer; mid-level compliance/privacy management (Compliance Manager); and compliance/privacy practitioners (Compliance/Risk Assistant, Compliance Administrator). This gift is not available to independent consultants or channel or technology partners.
**Offer subject to availability. These gifts are a $50 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.