Zoom | Wednesday, 24 April 2024 | 10:30AM SGT / 12:30PM AEST

Prepare for the e-Pocalypse


What if customers simply stopped getting your company’s emails? Organisations may face that scenario after three of the biggest email providers, Gmail, Apple, and Yahoo, announced new email authentication requirements, including DMARC.

Organisations that don’t comply could see their emails routed directly to customers’ spam folders or rejected altogether. Join our expert panel to learn what to do before the deadline—and how Proofpoint can help.

In this Power Series, our panel of experts will discuss:

  • Why Yahoo, Apple, and Google are mandating email authentication
  • How email authentication and DMARC work
  • The benefits and challenges of meeting the new requirements

Bottle



Get Your Power Series Gift!

After the event, we’ll be giving away an Insulated Bottle* to the first 150 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Jennifer_Cheng1.jpg
Jennifer Cheng | Cybersecurity Strategy Leader APJ at Proofpoint 

Jennifer Cheng is the Cybersecurity Strategy Leader at Proofpoint for Asia Pacific and Japan. She has over 15 years of experience consulting and educating IT professionals on new technologies, best practices, and industry trends. Prior to Proofpoint, Jennifer held business and technical roles at Cisco, Salesforce, and WatchDox. She has a B.S.E. degree in Computer Science from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.


Marc-De-Frontignac.jpg
Marc de Frontignac | Manager Sales Engineering, ANZ at Proofpoint

With almost 17 years of experience in the information security industry, previously at Symantec and Veritas, Marc de Frontignac currently works as the Australia and New Zealand Manager of Sales Engineering at Proofpoint. Marc has provided guidance on cybersecurity best practices to some of Asia Pacific’s largest organisations. His interests include cyber security risk management and human-centred cyber security. Marc is a Certified Information Systems Security Professional and is pursuing his MBA in Technology at the University of New South Wales.


Bruce Chai
Bruce Chai | Snr Sales Specialist, SE Asia and Korea at Proofpoint

Bruce brings a wealth of 17 years of regional cybersecurity experience to the table. His professional journey commenced with roles at leading cybersecurity vendors, system integrators, and telecommunications companies. Bruce’s unique perspective allows him to navigate the complex challenges organisations encounter while addressing their ever-evolving risk landscape and attack vectors.


Ash Valeski.jpg
Ash Valeski | Senior SER Solutions Director at Proofpoint

Ash Valeski is a Product Specialist for Email Fraud Defense, a solution Proofpoint acquired from Return Path in 2016 to prevent identity deception over email. Ash has spent his career developing products and partnerships at companies like Microsoft, Skype, and Tellme that make communicating over the internet safer and more efficient.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.

Zoom | Wednesday, 29 May 2024 | 9:30AM SGT / 11:30AM AEST

Identity Security Gaps and Threats


More than 80% of cyberattacks—including ransomware and data exfiltration—rely on exploiting a privileged identity. Although organizations spent nearly $20 billion per year on identity and access management (IAM) tools in 2023 alone, attackers are still getting through. Why are existing security approaches not doing the job and stopping attackers in the middle of the attack chain? Our experts will explore the gaps between common security strategies and today’s highly successful attacks.

Join this Power Series as our panel of experts discuss:

  • Why modern attacks center around using privileged identities
  • How to make sense of PAM, XDR, EDR and ITDR
  • Where identity threat detection and response can fill the gaps

Charger



Get Your Power Series Gift!

After the event, we’ll be giving away a Proofpoint Fast Wireless Charger* to the first 150 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Jennifer_Cheng1.jpg
Jennifer Cheng | Cybersecurity Strategy Leader APJ at Proofpoint 

Jennifer Cheng is the Cybersecurity Strategy Leader at Proofpoint for Asia Pacific and Japan. She has over 15 years of experience consulting and educating IT professionals on new technologies, best practices, and industry trends. Prior to Proofpoint, Jennifer held business and technical roles at Cisco, Salesforce, and WatchDox. She has a B.S.E. degree in Computer Science from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.


brian reed.jpg
Brian Reed | Sr. Director of Cybersecurity Strategy at Proofpoint

Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.


Ofer_Israeli.png
Ofer Israeli | Group Vice President & General Manager, Identity Threat Defense, Proofpoint, Inc.

Ofer Israeli is the Group Vice President and General Manager of Proofpoint’s Identity Threat Defense business. Ofer joined Proofpoint following the company’s acquisition of Illusive, of which Ofer was the founder and CEO. As a leader in Identity Threat Detection and Response, Illusive protects the biggest and most notable companies in the world by managing identity risk and detecting active attacks within environments. Before Illusive, Ofer managed development teams around the globe for Check Point Software Technologies and worked in the Atom Chip Lab at Ben-Gurion University, where he focused on theoretical quantum mechanics. Ofer holds B.Sc. degrees in Computer Science and Physics from Ben-Gurion University of the Negev.


Nir Greenberg.jfif
Nir Greenberg | Senior Director of Systems Engineering at Proofpoint 

Nir is our resident technical expert, making sure customer needs are understood and met across a wide variety of industry verticals and use cases. Before the acquisition of Illusive Networks by Proofpoint, Nir was the Vice President of SEs & CS in which he led teams of Sales Engineering, Customer Success, PS and Support for 8 years and prior to that, he spent seven years with Check Point where he led the International Endpoint Support Group. He also served as Communication Training Center Deputy Commander and Trainers’ Leader in the Hoshen unit of the Israel Defense Forces, which manages inter-unit communications for the IDF. He graduated from Rehovot’s ORT College as an Electronic and Computer Practical Engineer, and studied social science and management at the Open University



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.

Zoom | Wednesday, 26 June 2024 | 9:30AM SGT / 11:30AM AEST

Protecting the #1 Data Loss Vector


They’re not a new problem, but misdirected emails are the leading cause of both compliance violations for GDPR and HIPAA and accidental data loss. Are you worried about a physician sending the wrong health record to a patient? Or HR exposing confidential data via email to a wrong but similar-looking contact name? According to Ponemon research, 65% of all data loss incidents occurred via email in 2022. Nearly two-thirds of organizations experienced data loss or exfiltration due to an employee mistake on email. Security teams take 48 hours, on average, to detect and remediate a data loss incident caused by employee carelessness.

Join this Power Series as our panel of experts discuss:

  • How and why simple mistakes in email have become the #1 cause of fines and other serious consequences due to data loss
  • Why new AI- and behavior-based approaches can augment Microsoft and Google’s native capabilities to finally solve this problem
  • How you can help all your users become defenders of your organization’s data, lowering the burden on your analysts and reducing risk

Dufflebag



Get Your Power Series Gift!

After the event, we’ll be giving away a Duffle Bag* to the first 150 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Jennifer_Cheng1.jpg
Jennifer Cheng | Cybersecurity Strategy Leader APJ at Proofpoint 

Jennifer Cheng is the Cybersecurity Strategy Leader at Proofpoint for Asia Pacific and Japan. She has over 15 years of experience consulting and educating IT professionals on new technologies, best practices, and industry trends. Prior to Proofpoint, Jennifer held business and technical roles at Cisco, Salesforce, and WatchDox. She has a B.S.E. degree in Computer Science from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.


Darren Lee.JPG
Darren Lee | EVP and GM, Security Products and Services Group at Proofpoint

Darren Lee is responsible for the Proofpoint Security Products and Services Group. As GM, Darren is responsible for the Proofpoint core security offerings for Threat, Email Security, Identity Defense, Threat Research and Machine Learning. Prior to this role, Darren led the company’s Compliance and Digital Risk group, the financial services segment, and machine learning investments.

Before joining Proofpoint, Darren served as the Founder and CEO of NextPage, a leading provider of Information Governance solutions. Having founded multiple startup companies, he has vast experience in defining markets, creating products, executing acquisitions, and driving revenue to build viable businesses. Darren holds a B.S. in Electrical and Computer Engineering from BYU.


Henry_Thomas .jpg
Henry Trevelyan Thomas | Snr Director Customer Success, Tessian Group at Proofpoint

Henry is the Snr Director Customer Success in the Tessian Group at Proofpoint, responsible for ensuring Tessian’s clients have the right solutions in place to stand out from their competitors. As a former commercial/IP lawyer at global law firm Norton Rose Fulbright, Henry has worked with many high-profile technology companies on issues including cybersecurity, intellectual property and data protection.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.

Zoom | Thursday, 26 October 2023 | 10:30AM SGT / 12:30AM AEST

Break the Attack Chain


Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.

Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk.

Join our panel of experts in this Power Series to learn:

  • How to defend against identity threats and stop attackers
  • How these attacks lead to ransomware or data exfiltration
  • The importance of an active detection response solution
  • Best practices in building identity threat defences

Boomerang Backpack



Get Your Power Series Gift!

After the event, we’ll be giving away a Boomerang Backpack to the first 150 qualified attendees who place an order.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Adrian-covich.JPG
Adrian Covich | Snr Director, Systems Engineering APJ at Proofpoint 

Adrian is the Senior Director, Systems Engineering for Asia-Pacific and Japan at Proofpoint. Adrian joined Proofpoint from Broadcom/Symantec, where he spent nearly 13 years, originally starting with MessageLabs in 2007, and held a number of leadership roles, most recently as the local CTO for Broadcom and Email Security SME. Adrian is a passionate leader and Evangelist for Proofpoint, where he leads of a team of Systems Engineers to implement People-Centric solutions to help customers protect their biggest risks and greatest assets: their people


Chessin_Nate.png
Nate Chessin | SVP, Worldwide Systems Engineering at Proofpoint

Nate is a 20+ year technology and sales professional with broad experience as a sales and technical leader. As Vice President, Worldwide Systems Engineering at Proofpoint, he is providing the most effective security and compliance solutions to respond to cyber attacks in every channel including email, web, endpoint and cloud.

Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks, delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures.

Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE Emeritus #12034.


Ofer israeli
Ofer Israeli | GVP & GM, Identify Threat Defence at Proofpoint

Ofer Israeli is the GVP & GM, Identity Threat Defence at Proofpoint. Ofer was previously the CEO and Co-Founder of Illusive Networks which was acquired by Proofpoint in 2023. Prior to establishing Illusive Networks, Ofer managed development teams based around the globe at Israel’s seminal cybersecurity company Check Point Software Technologies.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, India, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.

Zoom | Wednesday, 15 February 2023 | 6PM - 7PM GMT

Identity is the New Attack Surface


Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.
Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk
Join our panel of experts in this Power Series to learn:

  • How to defend against identity threats and stop attackers
  • How these attacks lead to ransomware or data exfiltration
  • The importance of an active detection response solution
  • Best practices in building identity threat defenses

Proofpoint_Branded_Coffee_Tumbler-150.jpg



Get Your Power Series Gift!

As a thank you for joining us, we’re offering our security community a complimentary gift. Each qualified attendee* can request a Chi-Charge Stack Foldable 3-in-1 Fast Charge Mat* (or similar gift), when registering for this event.

* Power Series Gifts are only available to qualified attendees in the Australia, New Zealand, Singapore, Malaysia, Indonesia, Philippines, Vietnam, India, Taiwan.



SPEAKER


Adrian-covich.JPG
Adrian Covich | Snr Director, Systems Engineering APJ at Proofpoint 

Adrian is the Senior Director, Systems Engineering for Asia-Pacific and Japan at Proofpoint. Adrian joined Proofpoint from Broadcom/Symantec, where he spent nearly 13 years, originally starting with MessageLabs in 2007, and held a number of leadership roles, most recently as the local CTO for Broadcom and Email Security SME. Adrian is a passionate leader and Evangelist for Proofpoint, where he leads of a team of Systems Engineers to implement People-Centric solutions to help customers protect their biggest risks and greatest assets: their people


Ofer_Israeli.png
Ofer Israeli | Group Vice President & General Manager, Identity Threat Defense, Proofpoint, Inc.

Ofer Israeli is the Group Vice President and General Manager of Proofpoint’s Identity Threat Defense business. Ofer joined Proofpoint following the company’s acquisition of Illusive, of which Ofer was the founder and CEO. As a leader in Identity Threat Detection and Response, Illusive protects the biggest and most notable companies in the world by managing identity risk and detecting active attacks within environments. Before Illusive, Ofer managed development teams around the globe for Check Point Software Technologies and worked in the Atom Chip Lab at Ben-Gurion University, where he focused on theoretical quantum mechanics. Ofer holds B.Sc. degrees in Computer Science and Physics from Ben-Gurion University of the Negev.


Daniel Blackford.jpg
Daniel Blackford | Snr Manager, Threat Research at Proofpoint

Daniel Blackford is a threat researcher at Proofpoint. He spends his days hunting through massive amounts of mailflow and cloud data to identify malign threat activity in order to surface and provide context for those threats both directly to clients as well as through tools such as TAP. Daniel also tracks the various actors and TTPs that comprise the threat landscape.
Prior to his work at Proofpoint, Daniel worked as a malware analyst at the National Cyber Forensics and Training Alliance (NCFTA) on site in Pittsburgh, PA.
Daniel has a BS in Computer Science from the University of Pittsburgh.


Kimberley
Kimberly Pavelich | Snr Product Manager, Security Awareness at Proofpoint

Kimberly Pavelich spearheads the delivery of compelling, threat-driven security awareness and training content as the Proofpoint Security Awareness and Training (PSAT) Senior Product Manager. In crafting her approach to security awareness training, she draws on a wealth of expertise cultivated over a decade of working within both Canada's intelligence sector and various international post-conflict communities. Kimberly holds a Master of Strategic Studies from the University of Calgary and is a Political Science PhD Candidate at Carleton University.


SarahSabotka.jpg
Sarah Sabotka | Sr. Threat Researcher at Proofpoint

Sarah Sabotka is a Senior Threat Researcher on the Threat Research Team at Proofpoint where she focuses on presenting research from the threat landscape to customers and the public; her favourite topics to discuss include threat actor personas, and social engineering tactics. Sarah’s background is in animal cruelty investigations and cyber threat intelligence; she earned her B.A. in English from the University of Connecticut (Storrs), and M.S. in Cybersecurity from Utica University.


brian reed.jpg
Brian Reed | Sr. Director of Cybersecurity Strategy at Proofpoint

Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises organisations. This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are £50 value. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift, you represent and warrant that your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.


Protecting Sensitive Data

While protecting people and those who access and use data is important, we also need to think about how we go about defending data. Reactively following data movement is not enough. We need to fully understand the context, behaviours and threats associated with data before we can become successful defenders of data.


Identity is the New Attack Surface

Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.

Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk


Building a Strong Security Culture

According to Proofpoint’s 2023 State of the Phish Report, only 56% of organisations have conducted formal security awareness training. And yet, 58% of employees know what the term Phishing is, which suggests that training alone may not be as effective as we want it to be. Moreover, most people believe it’s the cybersecurity team’s sole responsibility to keep the organisation safe. It’s a common challenge for security professionals to change that mindset.

Having a strong security culture can not only help drive behavior change but also impact what users believe. So how can your organisation go beyond training and start building a security culture?


Improving M365 Security with Proofpoint

Many organisations utilize bundled security offerings from Microsoft and run under the assumption that Microsoft security is “good enough” or feature comparable to purpose-built security platforms. Security leaders often struggle to justify specific security spend outside of Microsoft and are desperate for ways to prove the value of security platforms versus simply using what is built-in to the Microsoft ecosystem. We must implement modern and practical requirements when designing a data security governance approach.


CISO Perspectives on Supply Chain and Third Party Risk

Tabletop exercises may uncover some supply chain and third-party risks. But few organisations doing them last year could have foreseen the effects of geopolitical conflict. Add to the mix a myriad of new risks—from cloud-based solutions to hybrid work environments and remote work—and CISOs have a lot to deal with. CISOs can transfer some responsibility for risks to cloud and third-party vendors. Ultimately, however, they’re accountable when it comes to keeping their organisations safe.



Mitigating Data Loss and Insider Threats

Insider threats are the top cybersecurity concern among chief information security officers (CISOs) globally, according to the Proofpoint 2022 Voice of the CISO report. Digital transformation, work-from-anywhere environments and employee turnover are increasing insider risk. As the modern way of working shifts, more data is generated and cloud adoption accelerates, CISOs are questioning if their legacy solutions can meet today’s demands. There is one constant factor among these ongoing shifts: people. After all, data doesn’t lose itself; people lose data. And more than half the time, insider threats can be attributed to careless users. These users unknowingly or unintentionally impact an organisation’s data or systems negatively.



Break the Attack Chain

Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.

Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk.



Augment M365 Defence

Few tools are as critical to modern business as Microsoft 365. Unfortunately, the platform’s reach and central role in the workplace also make it a prime target for cyber attackers. That’s why experts such as Gartner and Forrester recommend augmenting Microsoft 365’s native security features with complete email, cloud and data protection. We’ll explore new people-centric approaches to threat protection, identity defence and data loss prevention (DLP) to safeguard your Microsoft 365 investment.


Stop Insider Risks From Turning Into Insider Threats

Not every insider risk turns into an insider threat, but every insider threat began as an insider risk. Almost two-thirds—63%—of global CISOs say they have had to deal with the loss of sensitive information in the past year, according to the Proofpoint 2023 Voice of the CISO report. That’s why security leaders need an insider risk mitigation program that encompasses people, processes and technology for successful early intervention, detection and mitigation of insider threats. How can executives build out these robust defences and build internal buy-in by contextualizing their risk mitigation strategies within the framework of the larger corporate risk framework?


Year in Review and Predictions

2023 was a year of explosive change in the cybersecurity arena as the cyber attack chain—and the landscape as a whole—evolved on several fronts. As we head into 2024, threat actors are still experimenting at warp speed. In this Power Series, we’ll discuss what we saw this year, what’s coming in 2024 and what it all means for your cybersecurity program.


Defending Against Ransomware and BEC

Ransomware is one of today’s most disruptive forms of cyber attacks, and business email compromise (BEC) is one of the costliest. Modern organisations need a cybersecurity solution that addresses these and other threats across the entire attack chain. Learn how a people-centric approach powered by AI can help break the attack chain and stop email attacks and initial compromise.


Transform Users into Defenders

According to the 2024 State of the Phish Asia-Pacific and Japan, email compromise (BEC) is spreading rapidly across the region with 73% of organisations experiencing a BEC attack, yet only 29% of companies teach their users how to identify BEC. As attackers refine their tactics - from sophisticated tactics like MFA bypass (EvilProxy), to telephone-oriented attacks and QR-code phishing - equipping users for today’s threats has never been more critical.

(ISC)2 CPE Logo

Earn 2 CPE Credits

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.