ROBOTO CONDESED 24 PT ALL CAPS HORIZ 4.03", VERT1.82""
(ONL LINE HEADLINES) OR 2.76""(TWO LINE HEADLINE)
The event has already taken place, thanks for checking!
Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.
Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk.
Join our panel of experts in this Power Series to learn:
After the event, we’ll be giving away a Boomerang Backpack to the first 150 qualified attendees who place an order.
Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam
Adrian Covich is Senior Director of Systems Engineering for Proofpoint in Asia Pacific and Japan, leading a dedicated team charged with delivering people-centric security solutions and programmes. Adrian has spent the majority of his 20 years in the security industry specialising in email security and associated leadership roles – he most enjoys working with organisations across the region to protect their biggest risks and greatest assets: people.
Nate is a 20+ year technology and sales professional with broad experience as a sales and technical leader. As Vice President, Worldwide Systems Engineering at Proofpoint, he is providing the most effective security and compliance solutions to respond to cyber attacks in every channel including email, web, endpoint and cloud.
Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks, delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures.
Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE Emeritus #12034.
Ofer Israeli is the GVP & GM, Identity Threat Defence at Proofpoint. Ofer was previously the CEO and Co-Founder of Illusive Networks which was acquired by Proofpoint in 2023. Prior to establishing Illusive Networks, Ofer managed development teams based around the globe at Israel’s seminal cybersecurity company Check Point Software Technologies.
This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.
Few tools are as critical to modern business as Microsoft 365. Unfortunately, the platform’s reach and central role in the workplace also make it a prime target for cyber attackers. That’s why experts such as Gartner and Forrester recommend augmenting Microsoft 365’s native security features with complete email, cloud and data protection. We’ll explore new people-centric approaches to threat protection, identity defence and data loss prevention (DLP) to safeguard your Microsoft 365 investment.
In this Power Series, our panel of experts will discuss:
After the event, we’ll be giving away a Picnic Blanket* to the first 150 qualified attendees who place an order.
Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam
Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.
Adrian Covich is Senior Director of Systems Engineering for Proofpoint in Asia Pacific and Japan, leading a dedicated team charged with delivering people-centric security solutions and programmes. Adrian has spent the majority of his 20 years in the security industry specialising in email security and associated leadership roles – he most enjoys working with organisations across the region to protect their biggest risks and greatest assets: people.
Cheryl Tang leads product marketing for Core Email Security solutions at Proofpoint. She brings over 20 years of product marketing experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product marketing and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.
Daniel Blackford is a threat researcher at Proofpoint. He spends his days hunting through massive amounts of mailflow and cloud data to identify malign threat activity in order to surface and provide context for those threats both directly to clients as well as through tools such as TAP. Daniel also tracks the various actors and TTPs that comprise the threat landscape.
Prior to his work at Proofpoint, Daniel worked as a malware analyst at the National Cyber Forensics and Training Alliance (NCFTA) on site in Pittsburgh, PA.
Daniel has a BS in Computer Science from the University of Pittsburgh.
This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.
Not every insider risk turns into an insider threat, but every insider threat began as an insider risk. Almost two-thirds—63%—of global CISOs say they have had to deal with the loss of sensitive information in the past year, according to the Proofpoint 2023 Voice of the CISO report. That’s why security leaders need an insider risk mitigation program that encompasses people, processes and technology for successful early intervention, detection and mitigation of insider threats. How can executives build out these robust defences and build internal buy-in by contextualising their risk mitigation strategies within the framework of the larger corporate risk framework?
In this Power Series, our panel of experts will discuss:
After the event, we’ll be giving away a Tech Cap* to the first 150 qualified attendees who place an order.
Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam
With almost 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people.
Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and chief marketing officer and was responsible for successfully building and leading the product and marketing teams through the company’s acquisition by BlackBerry. Prior to WatchDox, he was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of leadership positions at ArcSight and VeriSign, working as a security practitioner across the US, EMEA, and Latin America.
In addition to serving as a trusted advisor to CISOs worldwide, Mr. Kalember is also a member of the National Cyber Security Alliance board and Cybersecurity Technical Advisory Board. He has provided cybersecurity counsel to the Aspen Institute, National Governors Association, and global government delegations including Jordan, North Macedonia, Peru, and Spain, and his expertise has been featured on ABCNews.com, BBC, Bloomberg, CNBC, Forbes, Fortune, NBC Bay Area, NBC Nightly News, USA Today, VOX, The Washington Post, and WIRED. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.
Jeremy Wittkop is Proofpoint’s Principal Security Architect. As InteliSecure’s former Chief Technology Officer, Jeremy was a foundational architect for InteliSecure’s internationally recognized Data Protection, Cloud Security, and User and Entity Behavior Analytics Services. Jeremy is a trusted data protection thought leader -- published author, blogger, public speaker, and advisor to clients and formerly public and private equity investors.
Steve Moros is responsible for leading sales and go-to-market for Proofpoint's award winning advanced technology including Information Protection, Compliance and Archiving, Security Awareness training, CASB, Email Fraud Detection, Web isolation, and Zero-Trust Networking products, across the APAC region.
Based out of Sydney, Steve Moros joined Proofpoint from Cisco, where he was Director of Cybersecurity for Australia and New Zealand. Steve has over 20 years’ experience working in IT and cybersecurity with a track record of driving new technology adoption and aligning go-to-market strategies to customer needs in fast-moving environments. Steve is passionate about building security awareness and focused on helping organisations increase their cybersecurity resilience capabilities, processes and strategies around protecting their data, assets and customers.
This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.
Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.
Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk.
Join our panel of experts in this Power Series to learn:
After the event, we’ll be giving away a Boomerang Backpack to the first 150 qualified attendees who place an order.
Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam
Adrian is the Senior Director, Systems Engineering for Asia-Pacific and Japan at Proofpoint. Adrian joined Proofpoint from Broadcom/Symantec, where he spent nearly 13 years, originally starting with MessageLabs in 2007, and held a number of leadership roles, most recently as the local CTO for Broadcom and Email Security SME. Adrian is a passionate leader and Evangelist for Proofpoint, where he leads of a team of Systems Engineers to implement People-Centric solutions to help customers protect their biggest risks and greatest assets: their people
Nate is a 20+ year technology and sales professional with broad experience as a sales and technical leader. As Vice President, Worldwide Systems Engineering at Proofpoint, he is providing the most effective security and compliance solutions to respond to cyber attacks in every channel including email, web, endpoint and cloud.
Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks, delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures.
Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE Emeritus #12034.
Ofer Israeli is the GVP & GM, Identity Threat Defence at Proofpoint. Ofer was previously the CEO and Co-Founder of Illusive Networks which was acquired by Proofpoint in 2023. Prior to establishing Illusive Networks, Ofer managed development teams based around the globe at Israel’s seminal cybersecurity company Check Point Software Technologies.
This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
*Offer subject to availability. These gifts are up to $40 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organisations within Australia, New Zealand, Singapore, India, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam. This gift is not available to independent consultants or channel or technology partners.
Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.
Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk
Join our panel of experts in this Power Series to learn:
As a thank you for joining us, we’re offering our security community a complimentary gift. Each qualified attendee* can request a Chi-Charge Stack Foldable 3-in-1 Fast Charge Mat* (or similar gift), when registering for this event.
* Power Series Gifts are only available to qualified attendees in the Australia, New Zealand, Singapore, Malaysia, Indonesia, Philippines, Vietnam, India, Taiwan.
With almost 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
Ofer Israeli is the Group Vice President and General Manager of Proofpoint’s Identity Threat Defense business. Ofer joined Proofpoint following the company’s acquisition of Illusive, of which Ofer was the founder and CEO. As a leader in Identity Threat Detection and Response, Illusive protects the biggest and most notable companies in the world by managing identity risk and detecting active attacks within environments. Before Illusive, Ofer managed development teams around the globe for Check Point Software Technologies and worked in the Atom Chip Lab at Ben-Gurion University, where he focused on theoretical quantum mechanics. Ofer holds B.Sc. degrees in Computer Science and Physics from Ben-Gurion University of the Negev.
Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.
This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises organisations. This gift is not available to independent consultants or channel or technology partners.
**Offer subject to availability. These gifts are £50 value. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift, you represent and warrant that your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
While protecting people and those who access and use data is important, we also need to think about how we go about defending data. Reactively following data movement is not enough. We need to fully understand the context, behaviours and threats associated with data before we can become successful defenders of data.
Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.
Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk
According to Proofpoint’s 2023 State of the Phish Report, only 56% of organisations have conducted formal security awareness training. And yet, 58% of employees know what the term Phishing is, which suggests that training alone may not be as effective as we want it to be. Moreover, most people believe it’s the cybersecurity team’s sole responsibility to keep the organisation safe. It’s a common challenge for security professionals to change that mindset.
Having a strong security culture can not only help drive behavior change but also impact what users believe. So how can your organisation go beyond training and start building a security culture?
Many organisations utilize bundled security offerings from Microsoft and run under the assumption that Microsoft security is “good enough” or feature comparable to purpose-built security platforms. Security leaders often struggle to justify specific security spend outside of Microsoft and are desperate for ways to prove the value of security platforms versus simply using what is built-in to the Microsoft ecosystem. We must implement modern and practical requirements when designing a data security governance approach.
Tabletop exercises may uncover some supply chain and third-party risks. But few organisations doing them last year could have foreseen the effects of geopolitical conflict. Add to the mix a myriad of new risks—from cloud-based solutions to hybrid work environments and remote work—and CISOs have a lot to deal with. CISOs can transfer some responsibility for risks to cloud and third-party vendors. Ultimately, however, they’re accountable when it comes to keeping their organisations safe.
Insider threats are the top cybersecurity concern among chief information security officers (CISOs) globally, according to the Proofpoint 2022 Voice of the CISO report. Digital transformation, work-from-anywhere environments and employee turnover are increasing insider risk. As the modern way of working shifts, more data is generated and cloud adoption accelerates, CISOs are questioning if their legacy solutions can meet today’s demands. There is one constant factor among these ongoing shifts: people. After all, data doesn’t lose itself; people lose data. And more than half the time, insider threats can be attributed to careless users. These users unknowingly or unintentionally impact an organisation’s data or systems negatively.
Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.
Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk.
Few tools are as critical to modern business as Microsoft 365. Unfortunately, the platform’s reach and central role in the workplace also make it a prime target for cyber attackers. That’s why experts such as Gartner and Forrester recommend augmenting Microsoft 365’s native security features with complete email, cloud and data protection. We’ll explore new people-centric approaches to threat protection, identity defence and data loss prevention (DLP) to safeguard your Microsoft 365 investment.
This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.