You're invited

MISSION POSSIBLE:
A TRILOGY SERIES

Zoom | Thursday, May 27, 2021 | 1:00PM-1:45PM ET

Phishing for Answers to a Zero-Trust Approach


The best way to protect and defend against today’s cyber attackers is to know your enemy.

In the first event in this three-part series, we’ll look at how the shift to working from home has cyber attackers more active than ever. With research insights from Proofpoint: State of the Phish and CyberArk: Protecting Privileged Access, you’ll have what you need to proactively and confidently evolve your approach to a Zero-Trust model that effectively thwarts cyber attackers.

Discover how to take action and make all the right moves to:

  • Leverage best practices from CISOs creating Zero-Trust models in today’s environment
  • Understand trends in spear phishing attacks and how they impact you
  • Avoid user awareness gaps and cybersecurity behaviors that could put your organization at risk
  • Take advantage of security awareness training and advice to make your program more effective


Join Proofpoint and CyberArk for the blockbuster insights, tools and next steps you need to take a people-centric approach to protecting privileged users from today’s most severe threats.

Ready to play a leading role in the fight against cyber threats? Reserve your seat today!

Get Your Own Movie Night Snack Pack!

We’re sending you your favorite movie munchies to enjoy during your own action-packed movie night at home! This event’s Movie Night Snack Pack* will include a $20 Amazon Gift Card (for early access movie streaming) and Béquet Celtic Sea Salt Caramel Gift Bag. Movie Night Snack Packs are only available to qualified attendees in the U.S. or Canada.

*If you cannot accept or wish not to accept the Movie Night Snack Pack, please make sure to decline upon registering.

Rutrun Vehicula Fermentum Lacinia Enim


FEATURED SPEAKERS

Brett Shaw
Brett Shaw | Sr. Product Marketing Manager, Proofpoint, Inc.

Brett Shaw is a Sr. Product Marketing Manager, educating our customers and staff on current threat landscape trends and security best practices. Brett has 10 years of experience helping IT professionals develop best practices with new technologies and keep pace with the evolving landscape. Brett earned his M.B.A from Weber State University.


Corey O'Conner
Corey O’Connor | Director of Product Marketing, CyberArk

Corey O’Connor is the Director of Product Marketing at CyberArk responsible for all Privileged Access Management solutions within the Identity Security portfolio. His experience through multiple product marketing roles both in security and data storage and management enables him to have a strong understanding of the continuous changes in privileged access security.

Zoom | Tuesday, June 22, 2021 | 1:00PM-1:45PM ET

Defense-in-Depth Protection to Secure People and Their Identity


You need to protect your people. Their identities are at risk. And that means your organization is, too. Cyber criminals are leveraging people-centric tactics to compromise the identity of your users – ultimately to exfiltrate data and disrupt business. In the second event in this three-part series, you’ll gain insights into why a people-centric approach to security can stop them.

You can take action and make all the right moves by learning how:

  • Cyber criminals target users’ identities in order to be successful in the attack
  • Proofpoint and CyberArk integrate to provide industry leading people-centric protection
  • To get more value in your investment through complementary integrations


Join Proofpoint and CyberArk for the blockbuster insights, tools and next steps you need to take a people-centric approach to protecting privileged users from today’s most severe threats.

Ready to play a leading role in the fight against cyber threats? Reserve your seat today!

Get Your Own Movie Night Snack Pack!

We’re sending you your favorite movie munchies to enjoy during your own action-packed movie night at home! This event’s Movie Night Snack Pack* will include a One Gallon Popcorn Trio Tin (Butter, Cheddar Cheese and Caramel). Movie Night Snack Packs are only available to qualified attendees in the U.S. or Canada.

*If you cannot accept or wish not to accept the Movie Night Snack Pack, please make sure to decline upon registering.

Rutrun Vehicula Fermentum Lacinia Enim

FEATURED SPEAKER

Harsh Doshi
Harsh Doshi | Staff Product Manager, Proofpoint, Inc.

Harsh Doshi is a Staff Product Manager at Proofpoint, in this role he is responsible for developing partner integrations and new solutions. Harsh has 10 years of experience developing cybersecurity products and services. Harsh has earned his Bachelor of Science from Virginia Tech.


Len Hoe
Len Noe | Global Sales Engineer, CyberArk

Len Noe is a Global Sales Engineer and White Hat Hacker for CyberArk Software. He, along with his team, help CyberArk customers build new integrations and use cases. Len is an international security speaker who has presented in over 20 countries and at multiple major security conferences worldwide. Prior to 2001 Len was a Black/Grey Hat Hacker and learned most of his skills by practical application. Noe has spent 20 years in the areas of web development, system engineering / administration, architecture, coding. Len is one of the drivers behind CyberArk’s Attack & Defend Series as the resident RedTeam leader. Len is also a speaker at this years RSA Virtual Experience, speaking about the dangers of augmented humans as an attack vector. He also actively participates in the activities of the Information Security communities in Texas, the Autism Society, and many others.

Zoom | Thursday, July 29, 2021 | 1:00PM-1:45PM ET

A People-Centric Approach to Protecting Privileged Users: A Customer Story


No matter the size of your organization, threat actors are aiming advanced threats at one of your most critical resources: your workforce. In the final event in this three-part series, we’ll go behind the scenes to hear real stories about how today’s attacks target people using ransomware, email fraud and credential phishing to compromise organizations. In fact, a recent study by Verizon shows that 85% of all breaches require human involvement.

Join us to learn:

  • How the latest threats are affecting organizations
  • What threat actors are doing to prey on human vulnerability
  • How customers leverage Proofpoint and CyberArk to stay ahead of the threat landscape


Join Proofpoint and CyberArk for the blockbuster insights, tools and next steps you need to take a people-centric approach to protecting privileged users from today’s most severe threats.

Ready to play a leading role in the fight against cyber threats? Reserve your seat today!

Get Your Own Movie Night Snack Pack!

We’re sending you your favorite movie munchies to enjoy during your own action-packed movie night at home! This event’s Movie Night Snack Pack* will include a Dylan’s Candy Bar Trio Tin (Red Swedish Fish, Mini Gummy Bears, and Sour Patch Kids). Movie Night Snack Packs are only available to qualified attendees** in the U.S. or Canada.

*If you cannot accept or wish not to accept the Movie Night Snack Pack, please make sure to decline upon registering.

Rutrun Vehicula Fermentum Lacinia Enim

FEATURED SPEAKERS

Chris Dawson
Christopher Dawson | Threat Intelligence Publications Lead, Proofpoint, Inc.

Christopher Dawson has spent years in the cybersecurity industry, focused on educating the infosec community and the public on threats, best practices, and the latest research. From his early days in academia to his current work as a Threat Intelligence Lead with Proofpoint, Chris has published and spoken extensively on a range of IT and security issues.


Andy Thompson
Andy Thompson | Research Labs Division, CyberArk

Andy Thompson is part of the Research Labs Division at CyberArk. This is the team within CyberArk that does ongoing research into offensive technology and information security trends. Before joining CyberArk 5 years ago, Andy spent his time in the trenches as a Senior Systems Admin and Security Engineer. He’s worked IT and Security with large hospitals, movie theater chains, bars and restaurants, other service industries, as well as global retail organizations.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organizations. It is also suitable for compliance decision-makers, including: General Counsel, Chief Compliance or Privacy Officer; mid-level compliance/privacy management (Compliance Manager); and compliance/privacy practitioners (Compliance/Risk Assistant, Compliance Administrator). This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are a $50 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.