Zoom | Thursday, 25 July 2024 | 9:30AM SGT | 11:30AM AEST

Behind the Scenes with Threat Research


One of the most common questions we get is “what does a day in the life of a cyber threat researcher look like?” Here’s your chance to find out directly from the team that goes toe-to-toe with threat actors every day. Learn how our researchers discover and disrupt cyberattacks, analyse threat actors and campaigns, and deliver industry-leading threat intelligence for human-centric security that protects customers and the wider cybersecurity community.

The Proofpoint Threat Research team comprises industry experts covering everything in the threat landscape—from BEC to MFA phish kits to novel malware loaders to QR-code phishing.

Join this Power Series as we discuss:

  • Threats that keep us up at night
  • Career paths to cybersecurity
  • What does Proofpoint do with our research?
  • Surprises from the threat landscape


skull beanie



Get Your Power Series Gift!

After the event, we’ll be giving away a Proofpoint Skull Beanie * to the first 150 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

For New Zealand residents only, please indicate if you would like to support the New Zealand Conservation Trust’s work to protect and advocate for New Zealand’s unique taonga.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Ryan-Kalember-2023.png
Ryan Kalember | EVP Cybersecurity Strategy at Proofpoint 

With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.


Daniel Blackford.jpg
Daniel Blackford | Snr Manager, Threat Research at Proofpoint

Formerly a researcher himself, Daniel currently leads Proofpoint's threat research team devoted to tracking financially-motivated actors. From high-profile botnets to credential harvesting and business email compromise, Daniel's team is in the weeds everyday leveraging Proofpoint's world class visibility to make high-confidence attributions and to share their findings with defenders across the world. Prior to his work at Proofpoint, Daniel worked as a malware analyst at the NCFTA and got his start tracking adversaries as a combat engineer with the US Army.


Alexis
Alexis Dorais-Joncas | Sr. Manager, Threat Research at Proofpoint

Alexis Dorais-Joncas is the Senior Manager of Proofpoint’s APT research team, where he and his team of threat researchers and intelligence analysts focus on tracking the most elusive state-sponsored threat actors and ensuring Proofpoint customers are protected against these persistent attackers. Prior to joining Proofpoint, Alexis led ESET’s Montreal-based R&D branch office for over 10 years, where his team focused on malware research, network security and targeted attacks tracking. Alexis is an established speaker on current cyberthreats, having spoken in front of diverse audiences at events such as Northsec, Bluehat, Botconf, First CTI, Sector and Rightscon. He has also been quoted in several security and technical media such as Wired, ITWorldCanada and Ars Technica, with broadcast appearances on Radio-Canada and Skynews. Alexis holds an M. Sc. in Electrical Engineering from the University of Sherbrooke in Canada.


SarahSabotka.jpg
Sarah Sabotka | Sr. Threat Researcher at Proofpoint

Sarah Sabotka is a Senior Threat Researcher on the Threat Research Team at Proofpoint where she focuses on commodity crimeware campaigns and communicating the threat landscape to customers and the public. Sarah had her start by doing OSINT collection, case development, and law enforcement collaboration to support animal cruelty investigations for an international animal welfare organization. Prior to joining Proofpoint, Sarah spent over four years developing and leading the Global Cyber Threat Intelligence team at Experian, where she was also responsible for leading brand monitoring, threat hunting, vulnerability intelligence, and ad-hoc incident response activities; before that she was a Senior Threat Analyst at Goldman Sachs. Sarah earned her B.A. in English from the University of Connecticut (Storrs), and her M.S. in Cybersecurity from Utica College. She resides in southern New Hampshire where she runs a 501(c)3 animal rescue and sanctuary with her husband, home to 14 rescue dogs and four rescue fish.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, India, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.

Zoom | Wednesday, 28 August 2024 | 9:30AM SGT | 11:30AM AEST

The Human-Centric Security Imperative


At Proofpoint, we’ve long championed human-centric cybersecurity as a critical priority for infosec teams. As traditional security controls struggle more than ever with modern threats, the broader industry is finally coming around to the idea. But what does human-centric look like in practice? In this session, we’’ll explore the ins-and-outs of putting people at the centre of your cyber defences. Hear about the four principal categories of human-based risks – threats, impersonation. Identity and data loss – and the best approach for proactively addressing each holistically.

Join this Power Series as our panel of experts discuss:

  • Why human-centric security is a game-changer for security teams
  • How and where to deploy AI most effectively
  • The surprising synergies between threat protection and DLP

Boomerang Backpack



Get Your Power Series Gift!

After the event, we’ll be giving away a Proofpoint Vacuum Flask to the first 150 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

For New Zealand residents only, please indicate if you would like to support the New Zealand Conservation Trust’s work to protect and advocate for New Zealand’s unique taonga.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Nate Chessin_180.jpg
Nate Chessin | SVP, Worldwide Sales Engineering at Proofpoint, Inc.

Nate Chessin is a 20 year technology and sales professional with extensive leadership and technical sales experience. Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures. Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE #12034.


catherinehwang.jpg
Cat Hwang | Sr. Director, Product Marketing at Proofpoint

Catherine Hwang is a Sr. Director of Product Marketing at Proofpoint, where she drives product marketing strategy for cloud app security, information protection, and compliance. Hwang has been with Proofpoint for over 3 years. Prior to joining Proofpoint, she has held a variety of strategic and technical roles at companies such as McAfee and Mercury (acquired by Hewlett-Packard). Hwang has a degree in Computer Engineering degree from the University of Michigan.


Cheryl_Tang.jpg
Cheryl Tang | Sr. Director, Product Marketing at Proofpoint

Cheryl Tang leads product marketing for Core Email Security solutions at Proofpoint. She brings over 20 years of product marketing experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product marketing and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.


jasminewu.jpg
Jasmine Wu | Sr. Director, Product Marketing at Proofpoint

Jasmine Wu is the Senior Director of Product Marketing and Head of GTM Operations at Proofpoint. She has over 15+ years of experience providing thought leadership and advisory in the emerging technologies space, including cloud collaboration, corporate risk protection, information governance, and digital transformation.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises organisations. This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are £50 value. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift, you represent and warrant that your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.

Zoom | Thursday, 26 September 2024 | 9:30AM SGT | 11:30AM AEST

Defending Data in the Age of AI


Generative AI presents a clear opportunity to accelerate innovation. According to the McKinsey Global Survey, 25% of C-suite executives are personally using GenAI tools for work.
In this session, our experts will explore how to enable safe adoption of GenAI and how it is already driving the use of AI tools in data loss prevention.

Join this Power Series as our panel of experts discuss:

  • How GenAI is used and presents risk to data
  • How to monitor and control the use of GenAI
  • How AI tools can help you defend your data

Bluetooth Speaker



Get Your Power Series Gift!

After the event, we’ll be giving away a Proofpoint Bluetooth Speaker* to the first 150 qualified attendees who place an order.

For Australian residents, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

​For New Zealand residents, please indicate if you like to support NZ Conservation Programmes, in lieu of the gift.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


WILLIAM
William Sitaldas | Director for Information Security, Business Continuity, and IT Audit and Compliance at Shearwater Health

William Sitaldas is a seasoned security practitioner with over 15 years of experience, currently working with Shearwater Health. He specialises in protecting systems, data, and individuals from a wide range of cyber threats. As a leader in the organisation’s security efforts, he has successfully guided Shearwater Health through four HITRUST r2 certifications and multiple HIPAA and SOC audits, ensuring compliance with the highest standards of information security. His expertise includes risk management, network security, vulnerability assessments, incident response, and regulatory compliance. With a passion for mentoring the next generation of security professionals, William is committed to ensuring that security remains a top priority for Shearwater Health.


Jennifer_Cheng1.jpg
Jennifer Cheng | Cybersecurity Strategy Leader APJ at Proofpoint 

Jennifer Cheng is the Cybersecurity Strategy Leader at Proofpoint for Asia Pacific and Japan. She has over 15 years of experience consulting and educating IT professionals on new technologies, best practices, and industry trends. Prior to Proofpoint, Jennifer held business and technical roles at Cisco, Salesforce, and WatchDox. She has a B.S.E. degree in Computer Science from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.


Nate Chessin_180.jpg
Itir Clarke | Product Marketing Manager at Proofpoint, Inc.

Itir Clarke is a Staff Product Marketing Manager for Proofpoint's Information and Cloud Security solutions. Before joining Proofpoint, Itir worked on data center products at Cisco, Brocade and Sun Microsystems. Itir has over 20 years of information technology experience in OEM Marketing, Product Marketing and Management roles. Her responsibilities at Proofpoint include positioning and messaging of our Information Protection solutions, evangelizing our people-centric approach to Enterprise Data Loss Prevention, blogging about cloud and insider threats, definition and execution of campaigns and promotions, and sales enablement. In her role as a Sr. Product Marketing Manager, she works closely with product management, threat research, and corporate marketing to bring new DLP, insider threat management and managed services capabilities to the Information Protection market. She also collaborates with analyst firms on market research projects, conducting surveys to develop educational reports on data security and insider threat management trends and customer requirements. Itir has significant experience at communicating technical and strategic vision to customer, sales and analyst organizations.


Matt Patterson
Matt Patterson | Solutions Architect: Information Protection, APJ at Proofpoint

Matt Patterson is a Technical Solutions Architect covering Information Protection at Proofpoint for Asia Pacific and Japan. Matt has worked in Cyber Security for the last 20 years. He has been a Security Analyst in large enterprise, a Security Engineer in high-tech and IoT environments, and most recently as a vendor Sales Engineer and Specialist for endpoint, cloud and data security. Here at Proofpoint, Matt is the technical expert for all things Information Protection enabling our customers to get the best outcomes from the platform.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises organisations. This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are £50 value. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift, you represent and warrant that your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.

Zoom | Thursday, 24 October 2024 | 9:30AM SGT | 12:30PM AEDT

Voice of the CISO


While the past 12 months may appear calmer, for CISOs, this period marked the continued building of a perfect storm. Hybrid work, increased reliance on cloud technology, tighter budgets, greater regulatory compliance pressures and an ever-expanding attack surface have all contributed to the swirl. The advent of the rapid emergence of the ‘double-edge sword’ known as Generative AI has further complicated the landscape, lowering the bar for cybercriminals while increasing opportunity for business and security professionals alike.

CISOs now enjoy closer ties with key stakeholders, board members, and regulators, but this proximity brings higher stakes, more pressure, and heightened expectations. Amid flat or reduced budgets, they must achieve more with less, navigating an environment where shortcuts can lead to human error. Join us as we delve into Proofpoint's survey of 1,600 CISOs worldwide. We’ll explore the delicate balance between concern and confidence, the role of human-centric defenses, and the challenges of burnout, personal liability, and boardroom relationships.

Participate in this Power Series as our panel of experts discuss:

  • Why CISOs are experiencing heightened concerns amidst growing confidence
  • Why human error is the common and persistent vulnerability
  • How they are addressing the double-edged sword that is AI




Get Your Power Series Gift!

After the event, we’ll be giving away a Proofpoint Charging Cable* to the first 150 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

For New Zealand residents only, please indicate if you would like to support the New Zealand Conservation Trust’s work to protect and advocate for New Zealand’s unique taonga.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKERS


Jennifer_Cheng1.jpg
Jennifer Cheng | Director of Cybersecurity Strategy, Asia-Pacific and Japan (APJ) at Proofpoint

Jennifer is the Director of Cybersecurity Strategy for Asia Pacific and Japan (APJ) at Proofpoint, where she drives thought leadership, market research, and product investment across the APJ region. In her role, she provides expertise to customers and partners on Proofpoint’s strategies within human-centric security, risk management, data privacy, information protection, security awareness and compliance.

Jennifer brings over 20 years of international experience working in both global and regional roles for technology companies. Prior to joining Proofpoint, Jennifer held strategic and technical roles at Cisco and WatchDox, an Israeli startup acquired by Blackberry. She is currently based in Singapore.

Jennifer holds a Master of Business Administration in Strategic and Entrepreneurial Management from the Wharton School of the University of Pennsylvania and a Bachelor of Engineering in Computer Science from the University of Michigan.


Patrick_Joyce (1).JPG
Patrick Joyce | Global Resident Chief Information Security Officer

Patrick Joyce is the Global Resident Chief Information Security Officer at Proofpoint. In this role, he serves as a strategic advisor to the greater CISO community and spearheads Proofpoint’s Customer Advisory Board (CAB). He is focused solely on the security needs of customer CISOs by delivering unbiased advice, knowledge and training to help CISOs stay ahead of the curve in the ever-changing threat landscape. Mr. Joyce is a highly respected cybersecurity practitioner and industry thought leader with over 30 years of experience in the IT and security field. Before joining Proofpoint in November 2023, he served as Vice President and Chief Security Officer (both CSO & CISO) for Medtronic, a Fortune 500 MedTech enterprise, where he was responsible for leading the company’s global security strategies, operations and initiatives. Prior to joining Medtronic, Patrick held leadership roles in both public and private sector organizations across multiple verticals, including healthcare (both provider & payor), travel/hospitality, and IT consulting. He also served as an Officer in the US Air Force and in the US Intelligence Community. In addition to his accomplishments as a business partner and trusted advisor, Patrick is also known for his commonsense approach, calm and careful leadership, sound judgment, and ability to communicate effectively at all levels.


KarenLetain.jpg
Karen Letain | VP, Product Management at Proofpoint

Karen leads the Product UX and Content teams for Proofpoint’s Security Awareness Division. Prior to Proofpoint, Karen was Head of Global Strategy and Innovation for McAfee’s Consumer Division leading the innovation product management, design and strategy teams. She was instrumental in launching a new 3-year strategy focused on moving the organization beyond antivirus to privacy and personal protection. Karen also drove the innovation teams to producing and delivering new performance enhancements in McAfee’ consumer products. Karen was also influential in managing McAfee Consumer’s M&A efforts resulting in the successful purchase of a 40M technology company to help accelerate the roadmap toward personal protection. Karen has also founded and led a number of start-ups in both Cybersecurity and Marketing and was VP of Operations for Thomson Learning the learning arm of Thomson Publishing (now CENGAGE). An active learner, Karen holds a number of degrees and designations. When not working or studying, she spends her time with her husband Claude, 2 children Gabrielle and Dominic and a very large furry 4-legged golden doodle.


Molly Mclain Sterling.jpg
Molly McLain Sterling | Cybersecurity Strategy Director at Proofpoint

Molly spent 16+ years at Medtronic in a variety of IT and information security roles, including leading a global security culture organization that spanned 100K+ end users in 150+ countries. Throughout her career, she spent time working on DLP and incident management programs and has also been involved in several advisory boards and leadership groups in the information security industry, including SANS Security Awareness Summit Advisory Boards, as well as other regional information security, privacy, and risk organizations. She has also been a frequent public speaker, including the top-rated speaker at last year’s SANS Human Risk Management conference, Cyber Security Summit series, as well as a speaker at last year’s Protect 2023 conference. During her free time, she loves spending time with her husband, her six-year-old daughter aka “karate queen” and two-year-old son “the wrecking ball”.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, India, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.

Zoom | Thursday, 14 November 2024 | 9:30AM SGT | 12:30PM AEDT

Strengthening M365 with Human-Centric Security


Microsoft’s native and add-on email security capabilities help to protect basic email-based threats, but they aren’t enough to ensure full protection. Today’s integrated cyber attacks target people and not just technology. Join us and learn why an effective defense against modern threats like business email compromise, advanced phishing, social engineering attacks, impersonation abuse, and accidental data loss require a human-centric security approach to fortify Microsoft 365 email defenses.

Participate in this Power Series as our panel of experts discuss:

  • Today’s top cyber landscape risks
  • Threat trends targeting Microsoft
  • Where to augment Microsoft security
  • How to strengthen Microsoft defenses

Tech Cap



Get Your Power Series Gift!

After the event, we’ll be giving away a Micro Ripstop Tech Cap* to the first 150 qualified attendees who place an order.

For Australian residents only - please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

For New Zealand residents only - please indicate if you would like to support the New Zealand Conservation Trust’s work to protect and advocate for New Zealand’s unique taonga.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam



SPEAKER


Jennifer_Cheng1.jpg
Jennifer Cheng | Director of Cybersecurity Strategy, Asia-Pacific and Japan (APJ) at Proofpoint

Jennifer is the Director of Cybersecurity Strategy for Asia Pacific and Japan (APJ) at Proofpoint, where she drives thought leadership, market research, and product investment across the APJ region. In her role, she provides expertise to customers and partners on Proofpoint’s strategies within human-centric security, risk management, data privacy, information protection, security awareness and compliance.

Jennifer brings over 20 years of international experience working in both global and regional roles for technology companies. Prior to joining Proofpoint, Jennifer held strategic and technical roles at Cisco and WatchDox, an Israeli startup acquired by Blackberry. She is currently based in Singapore.

Jennifer holds a Master of Business Administration in Strategic and Entrepreneurial Management from the Wharton School of the University of Pennsylvania and a Bachelor of Engineering in Computer Science from the University of Michigan.


Alex-Sheppard-Coloured.png
Alex Sheppard | Senior Sales Engineer at Proofpoint, Inc.

Adrian is the Senior Director, Technical Sales, at Proofpoint APAC.  Adrian joined Proofpoint from Broadcom/Symantec, where he spent nearly 13 years, originally starting with MessageLabs in 2007, and held a number of  leadership roles, most recently as the local CTO for Broadcom and Email Security SME.  Adrian is a passionate leader and Evangelist for Proofpoint, where he leads of a team of Systems Engineers to implement People-Centric solutions to help customers protect their biggest risks and greatest assets: their people



tim-bedard.jpg
Tim Bedard | Director, Product Marketing, Threat Protection at Proofpoint

Tim is the Director of Product Marketing for Proofpoint Threat Protection. It is a comprehensive AI-driven solution that provides continuous threat detection and analysis (pre-delivery to post-delivery to click time) throughout the email delivery flow. With end-to-end protection, organizations can better fortify email defenses to protect people against today’s emerging threats. With over twenty-five years of product management and product marketing expertise, Tim has extensive experience driving product vision, strategy, and execution at leading security organizations including, ForgeRock, SailPoint Technologies, and RSA Security. He is an active security evangelist at industry trade shows and in his free time works towards becoming a scratch


geoff-viscas.png
Geoff Vicas | Senior Sales Engineer, Competitive Intelligence APJ at Proofpoint

Geoff is the lead in APJ for market intelligence and technical comparison of products across Proofpoint's Security Platform. Based out of Japan, Geoff has spent 10 years in the Cybersecurity industry. Having recently spent the past 4 years guiding competitive strategy with Proofpoint in the US, Geoff is excited to continue working with Proofpoint's customers across APJ.



Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises organisations. This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are £50 value. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift, you represent and warrant that your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.


Protecting Sensitive Data

While protecting people and those who access and use data is important, we also need to think about how we go about defending data. Reactively following data movement is not enough. We need to fully understand the context, behaviours and threats associated with data before we can become successful defenders of data.


Identity is the New Attack Surface

Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.

Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk


Building a Strong Security Culture

According to Proofpoint’s 2023 State of the Phish Report, only 56% of organisations have conducted formal security awareness training. And yet, 58% of employees know what the term Phishing is, which suggests that training alone may not be as effective as we want it to be. Moreover, most people believe it’s the cybersecurity team’s sole responsibility to keep the organisation safe. It’s a common challenge for security professionals to change that mindset.

Having a strong security culture can not only help drive behavior change but also impact what users believe. So how can your organisation go beyond training and start building a security culture?


Improving M365 Security with Proofpoint

Many organisations utilize bundled security offerings from Microsoft and run under the assumption that Microsoft security is “good enough” or feature comparable to purpose-built security platforms. Security leaders often struggle to justify specific security spend outside of Microsoft and are desperate for ways to prove the value of security platforms versus simply using what is built-in to the Microsoft ecosystem. We must implement modern and practical requirements when designing a data security governance approach.


CISO Perspectives on Supply Chain and Third Party Risk

Tabletop exercises may uncover some supply chain and third-party risks. But few organisations doing them last year could have foreseen the effects of geopolitical conflict. Add to the mix a myriad of new risks—from cloud-based solutions to hybrid work environments and remote work—and CISOs have a lot to deal with. CISOs can transfer some responsibility for risks to cloud and third-party vendors. Ultimately, however, they’re accountable when it comes to keeping their organisations safe.


Mitigating Data Loss and Insider Threats

Insider threats are the top cybersecurity concern among chief information security officers (CISOs) globally, according to the Proofpoint 2022 Voice of the CISO report. Digital transformation, work-from-anywhere environments and employee turnover are increasing insider risk. As the modern way of working shifts, more data is generated and cloud adoption accelerates, CISOs are questioning if their legacy solutions can meet today’s demands. There is one constant factor among these ongoing shifts: people. After all, data doesn’t lose itself; people lose data. And more than half the time, insider threats can be attributed to careless users. These users unknowingly or unintentionally impact an organisation’s data or systems negatively.


Break the Attack Chain

Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.

Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk.


Augment M365 Defence

Few tools are as critical to modern business as Microsoft 365. Unfortunately, the platform’s reach and central role in the workplace also make it a prime target for cyber attackers. That’s why experts such as Gartner and Forrester recommend augmenting Microsoft 365’s native security features with complete email, cloud and data protection. We’ll explore new people-centric approaches to threat protection, identity defence and data loss prevention (DLP) to safeguard your Microsoft 365 investment.


Stop Insider Risks From Turning Into Insider Threats

Not every insider risk turns into an insider threat, but every insider threat began as an insider risk. Almost two-thirds—63%—of global CISOs say they have had to deal with the loss of sensitive information in the past year, according to the Proofpoint 2023 Voice of the CISO report. That’s why security leaders need an insider risk mitigation program that encompasses people, processes and technology for successful early intervention, detection and mitigation of insider threats. How can executives build out these robust defences and build internal buy-in by contextualizing their risk mitigation strategies within the framework of the larger corporate risk framework?


Year in Review and Predictions

2023 was a year of explosive change in the cybersecurity arena as the cyber attack chain—and the landscape as a whole—evolved on several fronts. As we head into 2024, threat actors are still experimenting at warp speed. In this Power Series, we’ll discuss what we saw this year, what’s coming in 2024 and what it all means for your cybersecurity program.


Defending Against Ransomware and BEC

Ransomware is one of today’s most disruptive forms of cyber attacks, and business email compromise (BEC) is one of the costliest. Modern organisations need a cybersecurity solution that addresses these and other threats across the entire attack chain. Learn how a people-centric approach powered by AI can help break the attack chain and stop email attacks and initial compromise.


Transform Users into Defenders

According to the 2024 State of the Phish Asia-Pacific and Japan, email compromise (BEC) is spreading rapidly across the region with 73% of organisations experiencing a BEC attack, yet only 29% of companies teach their users how to identify BEC. As attackers refine their tactics - from sophisticated tactics like MFA bypass (EvilProxy), to telephone-oriented attacks and QR-code phishing - equipping users for today’s threats has never been more critical.


Prepare for the e-Pocalypse

What if customers simply stopped getting your company’s emails? Organisations may face that scenario after three of the biggest email providers, Gmail, Apple, and Yahoo, announced new email authentication requirements, including DMARC.


Identity Security Gaps and Threats

More than 80% of cyberattacks—including ransomware and data exfiltration—rely on exploiting a privileged identity. Although organisations spent nearly $20 billion per year on identity and access management (IAM) tools in 2023 alone, attackers are still getting through. Why are existing security approaches not doing the job and stopping attackers in the middle of the attack chain? In this Power Series webinar our experts explore the gaps between common security strategies and today’s highly successful attacks.


Protecting the #1 Data Loss Vector

Both compliance violations for GDPR and HIPAA and accidental data loss. Are you worried about a physician sending the wrong health record to a patient? Or HR exposing confidential data via email to a wrong but similar-looking contact name? According to Ponemon research, 65% of all data loss incidents occurred via email in 2022. Nearly two-thirds of organizations experienced data loss or exfiltration due to an employee mistake on email. Security teams take 48 hours, on average, to detect and remediate a data loss incident caused by employee carelessness.


Behind the Scenes with Threat Research

One of the most common questions we get is “what does a day in the life of a cyber threat researcher look like?” Here’s your chance to find out directly from the team that goes toe-to-toe with threat actors every day. Learn how our researchers discover and disrupt cyberattacks, analyse threat actors and campaigns, and deliver industry-leading threat intelligence for human-centric security that protects customers and the wider cybersecurity community.


The Human-Centric Security Imperative

At Proofpoint, we’ve long championed human-centric cybersecurity as a critical priority for infosec teams. As traditional security controls struggle more than ever with modern threats, the broader industry is finally coming around to the idea. But what does human-centric look like in practice? In this session, we’’ll explore the ins-and-outs of putting people at the centre of your cyber defences. Hear about the four principal categories of human-based risks – threats, impersonation. Identity and data loss – and the best approach for proactively addressing each holistically.


Defending Data in the Age of AI

Generative AI presents a clear opportunity to accelerate innovation. According to the McKinsey Global Survey, 25% of C-suite executives are personally using GenAI tools for work.
In this session, our experts will explore how to enable safe adoption of GenAI and how it is already driving the use of AI tools in data loss prevention.


Voice of the CISO

While the past 12 months may appear calmer, for CISOs, this period marked the continued building of a perfect storm. Hybrid work, increased reliance on cloud technology, tighter budgets, greater regulatory compliance pressures and an ever-expanding attack surface have all contributed to the swirl. The advent of the rapid emergence of the ‘double-edge sword’ known as Generative AI has further complicated the landscape, lowering the bar for cybercriminals while increasing opportunity for business and security professionals alike.

CISOs now enjoy closer ties with key stakeholders, board members, and regulators, but this proximity brings higher stakes, more pressure, and heightened expectations. Amid flat or reduced budgets, they must achieve more with less, navigating an environment where shortcuts can lead to human error. Join us as we delve into Proofpoint's survey of 1,600 CISOs worldwide. We’ll explore the delicate balance between concern and confidence, the role of human-centric defenses, and the challenges of burnout, personal liability, and boardroom relationships.

(ISC)2 CPE Logo

Earn 2 CPE Credits

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.