Inter 24 PT ALL CAPS HORIZ 4.03", VERT1.82""
(ONL LINE HEADLINES) OR 2.76""(TWO LINE HEADLINE)
The event has already taken place, thanks for checking!

Protecting data across APAC has never been more complex—or more critical. Rapid cloud adoption, accelerated use of generative AI, and a constantly evolving regulatory landscape are increasing the risk of data exposure across the region. Join us for an exclusive look at the Proofpoint 2025 Data Security Landscape report, featuring new survey findings and Proofpoint threat intelligence that highlight the key drivers of data loss in APAC and globally, emerging AI-related risks, and how organisations are adapting.
You’ll walk away with practical insights to benchmark your data security program against peers and strengthen your data protection strategy as you tackle 2026.
Join this Power Series as our panel of experts discusses:

After the event, we’ll be giving away a Stainless Steel Lunch Box to the first 100 qualified attendees who place an order.
For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.
For New Zealand residents only, please indicate if you would like to support the New Zealand Conservation Trust’s work to protect and advocate for New Zealand’s unique taonga.
Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, India, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam.

Jennifer Cheng is the Cybersecurity Strategy Leader at Proofpoint for Asia Pacific and Japan. She has over 15 years of experience consulting and educating IT professionals on new technologies, best practices, and industry trends. Prior to Proofpoint, Jennifer held business and technical roles at Cisco, Salesforce, and WatchDox. She has a B.S.E. degree in Computer Science from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.

Richard Combes is a cybersecurity leader with over 20 years of experience in the field. Since 2020 he has led leads Sales Engineering for Data Protection across EMEA and APJ at Proofpoint helping customers manage data risks. Previously, he spent 15 years at Symantec in Product Management and Sales Engineering leader roles, specializing in data security. He holds a CISSP and IAPP EU Privacy Professional and Privacy Program Manager qualifications

Marty Weiss is an Enterprise Security Advisor at Proofpoint, where he partners with global customers to advance and strengthen their data security programs. Marty brings over two decades of experience at the intersection of cybersecurity, risk management, and data protection. He helps complex organizations align risk-driven security programs with real-world business outcomes, with a current focus on modernizing data security for today’s cloud-first, collaboration-heavy environments.
He’s the author of several bestselling books on security and compliance, and his insights are grounded in years of advising global enterprises across industries. Marty holds an MBA from the Isenberg School of Management at the University of Massachusetts Amherst and a BS in computer studies from the University of Maryland Global Campus.

Kasey Olbrych is a veteran of the United States Air Force with abackground in Fusion Intelligence, Counterterrorism, and HumanBehavioral Analysis. She transitioned into the Insider Risk discipline,spending the latter half of her government career conducting proactivebehavioral and technical analysis for Insider Threat investigationswithin the Department of Defense, leveraging advanced detectiontechnologies.
In the private sector, Kasey went on to lead global Insider RiskPrograms, including for a Fortune 500 retailer, where she built andscaled enterprise-wide strategies to proactively identify and mitigatehuman-driven risks.
Today, she serves as the founder and leader of Proofpoint’s Insider RiskPractitioner Forum, a peer-to-peer community with over 45organizations and 100+ active participants, dedicated to advancingbest practices in the field.
In celebration of International Women’s Day, Power Series is teaming up with Women Who Cyber to honor and celebrate women in cybersecurity. Women Who Cyber has received high praise for uniting diverse groups of aspiring and accomplished cybersecurity professionals through engaging events across North America.
Join this special Power Series for a conversation with Tracey Newell, a seasoned tech industry executive, seven-time board member, former Fortune 500 executive, and best-selling author of Hers for the Taking. Drawing on thirty-plus years of experience as a tech leader, mentor, and executive coach, Tracey will share valuable insights on transitioning to board roles and leaving a lasting legacy.
You’ll hear actionable advice on crucial leadership skills, including:
This Power Series is in collaboration with Proofpoint's Women Who Cyber. Women Who Cyber brings together a
diverse group of aspiring and thriving cybersecurity professionals for dynamic and interactive events where they can network with peers, establish meaningful mentoring relationships, share their knowledge, and enjoy unique experiences. Get Involved >

After the event, we’ll be giving away a free copy of Tracy Newell's Hers for the Taking: Your Path to the C-Suite & Beyond* to the first 1,100 qualified attendees** who claim their gift in the U.S. and Canada.

Nitza Daniel is the Vice President, Sales-Advanced Technology at Proofpoint. Mrs. Daniel has thrived in the technology industry since 1993 and has held key individual contributor and leadership roles at notable companies such as EMC and Veritas/Symantec. In 2015, she joined Proofpoint and has since more than doubled the size of the PNW NAM team while maintaining a high level of employee retention, revenue growth and overall Proofpoint product adoption. Nitza speaks three languages and holds degrees in Industrial Engineering and Computer Science. In her free time, she enjoys spending time with family, reading and eating dessert.

A powerhouse in the tech world, Tracey Newell serves on the board of five high growth software companies, while lending her insights as an advisor to Springcoast Capital. A champion for women in leadership, she’s the author of Amazon’s new best seller, Her’s for the Taking; Your Path to the C-Suite and Beyond. Tracey is the former president of Informatica, where she served as a member of Informatica’s board of directors for two years, prior to being asked to join Informatica’s management team. Prior to Informatica, Tracey was EVP of global field operations at Proofpoint, where she led sales through a five-year period of hypergrowth from 96M to 700M. Recognized as a Top 100 Sales Leader by The Modern Sale, Tracey led Proofpoint’s go-to-market team to become a top five leader in the cybersecurity market. Before Proofpoint, Tracey was EVP of global sales at Polycom, and has held leadership positions at Juniper Networks, Webex, and Cisco Systems. During her tenure at Cisco, Tracey was recognized by the organization Women Worth Watching. A believer in giving back, Tracey is an advisor for nonprofit Bridge2Rwanda, a board member for 4Word, and previously served as a Board Advisor for UC Santa Barbara’s economics department. Tracey graduated with honors from the UC Santa Barbara and completed Stanford’s 26th Annual Directors College.
Live from Proofpoint Protect 2025!
With trillions of email and cloud-based attacks happening every year, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.
Tune in to this special broadcast of Proofpoint Power Series, live from Protect 2025 in Nashville. Our Threat Research leaders will explore the current state of the threat landscape and unpack what it takes to stay ahead of adversaries. From cybercrime and espionage to the growing role of AI, one truth remains constant: people are at the center of today’s cybersecurity challenges.
Participate in this Power Series as our experts discuss:

With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

Chris Inglis is a distinguished cybersecurity leader with over 40 years of federal service. He served as the nation’s first National Cyber Director at the White House (2021–2023) and spent 17 years at the NSA, including as Deputy Director. A retired Brigadier General and command pilot in the U.S. Air Force and Air National Guard, Inglis also held academic and advisory roles, including as a commissioner on the U.S. Cyberspace Solarium Commission and a trustee of the National Intelligence University. His accolades include the President’s National Security Medal and the Director of National Intelligence Distinguished Service Medal. Inglis holds advanced degrees in engineering and computer science from Columbia, Johns Hopkins, and George Washington University. He resides in Annapolis, Maryland, with his wife, Anna.

Formerly a researcher himself, Daniel currently leads Proofpoint's threat research team devoted to tracking financially-motivated actors. From high-profile botnets to credential harvesting and business email compromise, Daniel's team is in the weeds everyday leveraging Proofpoint's world class visibility to make high-confidence attributions and to share their findings with defenders across the world. Prior to his work at Proofpoint, Daniel worked as a malware analyst at the NCFTA and got his start tracking adversaries as a combat engineer with the US Army.

Cristiana leads eCrime research at Proofpoint, bringing deep expertise in APT tracking, election interference, and Asia-pacific cyber ops from a background in military and defense analysis.
While protecting people and those who access and use data is important, we also need to think about how we go about defending data. Reactively following data movement is not enough. We need to fully understand the context, behaviours and threats associated with data before we can become successful defenders of data.
Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.
Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk
According to Proofpoint’s 2023 State of the Phish Report, only 56% of organisations have conducted formal security awareness training. And yet, 58% of employees know what the term Phishing is, which suggests that training alone may not be as effective as we want it to be. Moreover, most people believe it’s the cybersecurity team’s sole responsibility to keep the organisation safe. It’s a common challenge for security professionals to change that mindset.
Having a strong security culture can not only help drive behavior change but also impact what users believe. So how can your organisation go beyond training and start building a security culture?
Many organisations utilize bundled security offerings from Microsoft and run under the assumption that Microsoft security is “good enough” or feature comparable to purpose-built security platforms. Security leaders often struggle to justify specific security spend outside of Microsoft and are desperate for ways to prove the value of security platforms versus simply using what is built-in to the Microsoft ecosystem. We must implement modern and practical requirements when designing a data security governance approach.
Tabletop exercises may uncover some supply chain and third-party risks. But few organisations doing them last year could have foreseen the effects of geopolitical conflict. Add to the mix a myriad of new risks—from cloud-based solutions to hybrid work environments and remote work—and CISOs have a lot to deal with. CISOs can transfer some responsibility for risks to cloud and third-party vendors. Ultimately, however, they’re accountable when it comes to keeping their organisations safe.
Insider threats are the top cybersecurity concern among chief information security officers (CISOs) globally, according to the Proofpoint 2022 Voice of the CISO report. Digital transformation, work-from-anywhere environments and employee turnover are increasing insider risk. As the modern way of working shifts, more data is generated and cloud adoption accelerates, CISOs are questioning if their legacy solutions can meet today’s demands. There is one constant factor among these ongoing shifts: people. After all, data doesn’t lose itself; people lose data. And more than half the time, insider threats can be attributed to careless users.
Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.
Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk.
Few tools are as critical to modern business as Microsoft 365. Unfortunately, the platform’s reach and central role in the workplace also make it a prime target for cyber attackers. That’s why experts such as Gartner and Forrester recommend augmenting Microsoft 365’s native security features with complete email, cloud and data protection. We’ll explore new people-centric approaches to threat protection, identity defence and data loss prevention (DLP) to safeguard your Microsoft 365 investment.
Not every insider risk turns into an insider threat, but every insider threat began as an insider risk. Almost two-thirds—63%—of global CISOs say they have had to deal with the loss of sensitive information in the past year, according to the Proofpoint 2023 Voice of the CISO report. That’s why security leaders need an insider risk mitigation program that encompasses people, processes and technology for successful early intervention, detection and mitigation of insider threats.
2023 was a year of explosive change in the cybersecurity arena as the cyber attack chain—and the landscape as a whole—evolved on several fronts. As we head into 2024, threat actors are still experimenting at warp speed. In this Power Series, we’ll discuss what we saw this year, what’s coming in 2024 and what it all means for your cybersecurity program.
Ransomware is one of today’s most disruptive forms of cyber attacks, and business email compromise (BEC) is one of the costliest. Modern organisations need a cybersecurity solution that addresses these and other threats across the entire attack chain. Learn how a people-centric approach powered by AI can help break the attack chain and stop email attacks and initial compromise.
According to the 2024 State of the Phish Asia-Pacific and Japan, email compromise (BEC) is spreading rapidly across the region with 73% of organisations experiencing a BEC attack, yet only 29% of companies teach their users how to identify BEC. As attackers refine their tactics—from sophisticated MFA bypass techniques to telephone-oriented attacks and QR-code phishing—equipping users for today’s threats has never been more critical.
What if customers simply stopped getting your company’s emails? Organisations may face that scenario after three of the biggest email providers—Gmail, Apple, and Yahoo—announced new email authentication requirements, including DMARC.
More than 80% of cyberattacks—including ransomware and data exfiltration—rely on exploiting a privileged identity. Although organisations spent nearly $20 billion per year on identity and access management (IAM) tools in 2023 alone, attackers are still getting through. Why are existing security approaches not doing the job and stopping attackers in the middle of the attack chain? In this Power Series webinar our experts explore the gaps between common security strategies and today’s highly successful attacks.
Microsoft’s native and add-on email security capabilities help to protect basic email-based threats, but they aren’t enough to ensure full protection. Today’s integrated cyber attacks target people and not just technology. Join us and learn why an effective defense against modern threats like business email compromise, advanced phishing, social engineering attacks, impersonation abuse, and accidental data loss require a human-centric security approach to fortify Microsoft 365 email defenses.
2024 was a year of explosive change in the cybersecurity arena as cyber attackers honed their sights on exploiting humans and their identities. As we kick start into 2025, threat actors are increasingly using digital collaboration channels and the web, and the cloud to launch attacks, creating threat risk, identity sprawl, and data exposure in new ways.
In this Power Series, we’ll discuss what we saw in 2024, what’s coming this year and what it all means for your cybersecurity program.
Insider threats continue to increase and make headlines. So, it is no surprise that many CISOs consider it a high priority to proactively identify and prevent these types of threats. In fact, research from the 2024 Proofpoint Voice of the CISO report found that a third of CISOs globally see insider threats as their biggest cybersecurity threat over the next 12 months.
Cybersecurity risks don’t take the holidays off, so Proofpoint’s engineering and threat research teams have been hard at work on our latest innovations to help you protect your people and defend your data as we dive into 2025. Gartner called out pivoting to human-centric security as one of the top three CISO priorities for both 2024 and 2025, so we’ll unpack what that means in practice for security leaders and practitioners.
Cyber threats are constantly evolving, and with the rise of generative AI, threat actors are finding new ways to exploit human vulnerabilities. As organisations strengthen their security controls and awareness training, one challenge remains—people often knowingly bypass security measures for convenience, efficiency, or to meet tight deadlines.
Organisations experience more than one data loss incident per month, according to recent research. Business disruption, damaged reputation or regulatory fines almost always follow. Legacy DLP solutions cannot adequately address today’s most worrisome use cases, such as protecting cloud and endpoint data, as well as ensuring the acceptable use of GenAI tools. Forward-looking enterprises are actively modernising their data loss prevention programs by employing a human centric approach that provides visibility into users’ data access patterns across all applications and channels.
The cybersecurity landscape is constantly evolving as threat actors refine their tactics, develop new tools and delivery methods, and harness the power of artificial intelligence (AI). From crafting more convincing lures in previously hard-to-master languages to engineering creative attacks and executing custom social engineering schemes, their capabilities are advancing at an alarming pace. However, this evolution isn’t limited to attackers. Organisations face growing challenges in managing digital identities, navigating multi-cloud environments, and adapting to decentralised data strategies. With regulations demanding stric
As digital workspaces continue to expand, human-centric security challenges are becoming more complex. While email remains the primary threat vector, cybercriminals are increasingly targeting new channels, such as collaboration tools, messaging platforms, and file-sharing services, to exploit social engineering tactics. This has resulted in a fragmented security landscape, with disconnected point solutions that create gaps in risk mitigation and complicate integration and management efforts. How can your organization strengthen its security strategy while improving cost efficiency?
Building a robust data security program requires the right combination of people, processes, and technology. However, organizations struggle to justify increased investments in data security programs in 2025. It’s imperative to understand how Microsoft Purview can meet organizational requirements or create additional gaps in your data security posture and effectiveness. Whether you’re beginning your DLP journey or encountering challenges with a stalled Microsoft deployment, you don't want to miss this program.
Organisations face growing data security challenges. The average company manages over 100 terabytes of data, making it increasingly difficult for security teams to keep pace, especially as more applications are purchased and used outside of IT. This leads to increased data sprawl, reduced visibility, and more ways for data to be put at risk.
Protecting data across APAC has never been more complex—or more critical. Rapid cloud adoption, accelerated use of generative AI, and a constantly evolving regulatory landscape are increasing the risk of data exposure across the region. Join us for an exclusive look at the Proofpoint 2025 Data Security Landscape report, featuring new survey findings and Proofpoint threat intelligence that highlight the key drivers of data loss in APAC and globally, emerging AI-related risks, and how organisations are adapting.

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.
This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.