Zoom | Thursday, 12 February 2026
11:30am SGT | 2:30pm AEDT | 9:00am IST

Data Security Landscape


Protecting data across APAC has never been more complex—or more critical. Rapid cloud adoption, accelerated use of generative AI, and a constantly evolving regulatory landscape are increasing the risk of data exposure across the region. Join us for an exclusive look at the Proofpoint 2025 Data Security Landscape report, featuring new survey findings and Proofpoint threat intelligence that highlight the key drivers of data loss in APAC and globally, emerging AI-related risks, and how organisations are adapting.

You’ll walk away with practical insights to benchmark your data security program against peers and strengthen your data protection strategy as you tackle 2026.

Join this Power Series as our panel of experts discusses:

  • The top drivers of data security and how they’ve shifted
  • Emerging risks from generative AI, insider threats, cloud misconfigurations, and the oversharing of sensitive data across collaboration platforms
  • Why rising data volumes and a lack of expertise demand smarter, unified strategies
  • What leading organisations are prioritising to reduce risk and strengthen resilience

Lunchbox

Get Your Power Series Gift!

After the event, we’ll be giving away a Stainless Steel Lunch Box to the first 100 qualified attendees who place an order.

For Australian residents only, please indicate if you would like to Gift a Tree to the Foundation for National Parks & Wildlife in lieu of a gift.

For New Zealand residents only, please indicate if you would like to support the New Zealand Conservation Trust’s work to protect and advocate for New Zealand’s unique taonga.

Power Series Gifts are only available to qualified attendees** in Australia, New Zealand, Singapore, India, Indonesia, Malaysia, Philippines, Taiwan, Thailand, Vietnam.





Rutrun Vehicula Fermentum Lacinia Enim

Host

Jennifer_Cheng1.jpg
Jennifer Cheng | Director of Cybersecurity Strategy, Asia-Pacific and Japan at Proofpoint

Jennifer Cheng is the Cybersecurity Strategy Leader at Proofpoint for Asia Pacific and Japan. She has over 15 years of experience consulting and educating IT professionals on new technologies, best practices, and industry trends. Prior to Proofpoint, Jennifer held business and technical roles at Cisco, Salesforce, and WatchDox. She has a B.S.E. degree in Computer Science from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.

Featured Panelists

Richard Coombes HS.png
Richard Combes | Snr Manager - Data Protection Solution Architect at Proofpoint

Richard Combes is a cybersecurity leader with over 20 years of experience in the field. Since 2020 he has led leads Sales Engineering for Data Protection across EMEA and APJ at Proofpoint helping customers manage data risks. Previously, he spent 15 years at Symantec in Product Management and Sales Engineering leader roles, specializing in data security. He holds a CISSP and IAPP EU Privacy Professional and Privacy Program Manager qualifications


Marty-Weiss.jpg
Marty Weiss | Enterprise Security Advisor at Proofpoint

Marty Weiss is an Enterprise Security Advisor at Proofpoint, where he partners with global customers to advance and strengthen their data security programs. Marty brings over two decades of experience at the intersection of cybersecurity, risk management, and data protection. He helps complex organizations align risk-driven security programs with real-world business outcomes, with a current focus on modernizing data security for today’s cloud-first, collaboration-heavy environments.
He’s the author of several bestselling books on security and compliance, and his insights are grounded in years of advising global enterprises across industries. Marty holds an MBA from the Isenberg School of Management at the University of Massachusetts Amherst and a BS in computer studies from the University of Maryland Global Campus.


Kasey_Olbrych.jpg
Kasey Olbrych | Enterprise Security Architect at Proofpoint

Kasey Olbrych is a veteran of the United States Air Force with abackground in Fusion Intelligence, Counterterrorism, and HumanBehavioral Analysis. She transitioned into the Insider Risk discipline,spending the latter half of her government career conducting proactivebehavioral and technical analysis for Insider Threat investigationswithin the Department of Defense, leveraging advanced detectiontechnologies.​

In the private sector, Kasey went on to lead global Insider RiskPrograms, including for a Fortune 500 retailer, where she built andscaled enterprise-wide strategies to proactively identify and mitigatehuman-driven risks.​

Today, she serves as the founder and leader of Proofpoint’s Insider RiskPractitioner Forum, a peer-to-peer community with over 45organizations and 100+ active participants, dedicated to advancingbest practices in the field.


Zoom | Thursday, March 5, 2026
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

Women Who Cyber


In celebration of International Women’s Day, Power Series is teaming up with Women Who Cyber to honor and celebrate women in cybersecurity. Women Who Cyber has received high praise for uniting diverse groups of aspiring and accomplished cybersecurity professionals through engaging events across North America.

Join this special Power Series for a conversation with Tracey Newell, a seasoned tech industry executive, seven-time board member, former Fortune 500 executive, and best-selling author of Hers for the Taking. Drawing on thirty-plus years of experience as a tech leader, mentor, and executive coach, Tracey will share valuable insights on transitioning to board roles and leaving a lasting legacy.

You’ll hear actionable advice on crucial leadership skills, including:

  • Creating a long-term strategy to land in the C-suite or beyond
  • Developing executive presence and commanding respect in the boardroom
  • Building and leading high-performing teams
  • Mastering the art of influence and negotiation
  • Creating a network of mentors and sponsors to accelerate your success


This Power Series is in collaboration with Proofpoint's Women Who Cyber. Women Who Cyber brings together a diverse group of aspiring and thriving cybersecurity professionals for dynamic and interactive events where they can network with peers, establish meaningful mentoring relationships, share their knowledge, and enjoy unique experiences. Get Involved >



Hers for the Taking: Your Path to the C-Suite & Beyond

Get Your Power Series Gift!

After the event, we’ll be giving away a free copy of Tracy Newell's Hers for the Taking: Your Path to the C-Suite & Beyond* to the first 1,100 qualified attendees** who claim their gift in the U.S. and Canada.






Rutrun Vehicula Fermentum Lacinia Enim

Host

Nitza Daniel
Nitza Daniel | Vice President, Sales-Advanced Technology, Proofpoint, Inc.

Nitza Daniel is the Vice President, Sales-Advanced Technology at Proofpoint. Mrs. Daniel has thrived in the technology industry since 1993 and has held key individual contributor and leadership roles at notable companies such as EMC and Veritas/Symantec. In 2015, she joined Proofpoint and has since more than doubled the size of the PNW NAM team while maintaining a high level of employee retention, revenue growth and overall Proofpoint product adoption. Nitza speaks three languages and holds degrees in Industrial Engineering and Computer Science. In her free time, she enjoys spending time with family, reading and eating dessert.

Special Guest

Tracey Newell
Tracey Newell | Best Selling Author, Board Member, Advisor

A powerhouse in the tech world, Tracey Newell serves on the board of five high growth software companies, while lending her insights as an advisor to Springcoast Capital. A champion for women in leadership, she’s the author of Amazon’s new best seller, Her’s for the Taking; Your Path to the C-Suite and Beyond. Tracey is the former president of Informatica, where she served as a member of Informatica’s board of directors for two years, prior to being asked to join Informatica’s management team. Prior to Informatica, Tracey was EVP of global field operations at Proofpoint, where she led sales through a five-year period of hypergrowth from 96M to 700M. Recognized as a Top 100 Sales Leader by The Modern Sale, Tracey led Proofpoint’s go-to-market team to become a top five leader in the cybersecurity market. Before Proofpoint, Tracey was EVP of global sales at Polycom, and has held leadership positions at Juniper Networks, Webex, and Cisco Systems. During her tenure at Cisco, Tracey was recognized by the organization Women Worth Watching. A believer in giving back, Tracey is an advisor for nonprofit Bridge2Rwanda, a board member for 4Word, and previously served as a Board Advisor for UC Santa Barbara’s economics department. Tracey graduated with honors from the UC Santa Barbara and completed Stanford’s 26th Annual Directors College.

Zoom | Wednesday, September 24, 2025
10-11:30AM ET | 9-10:30AM CT | 8-9:30AM MT | 7-8:30AM PT - Americas

Navigating the Ever-Evolving Threat Landscape


Live from Proofpoint Protect 2025!

With trillions of email and cloud-based attacks happening every year, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.

Tune in to this special broadcast of Proofpoint Power Series, live from Protect 2025 in Nashville. Our Threat Research leaders will explore the current state of the threat landscape and unpack what it takes to stay ahead of adversaries. From cybercrime and espionage to the growing role of AI, one truth remains constant: people are at the center of today’s cybersecurity challenges.

Participate in this Power Series as our experts discuss:

  • The ever-evolving threat landscape. What’s changed and what’s stayed the same in 2025
  • The increasingly blurred lines between cybercrime and nation-state actors
  • One year later: the national security implications of AI

Rutrun Vehicula Fermentum Lacinia Enim

Host

Ryan Kalember
Ryan Kalember | Chief Strategy Officer, Proofpoint, Inc.

With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

Featured Panelists

Chris Inglis
Chris Inglis | Former U.S. National Cyber Director

Chris Inglis is a distinguished cybersecurity leader with over 40 years of federal service. He served as the nation’s first National Cyber Director at the White House (2021–2023) and spent 17 years at the NSA, including as Deputy Director. A retired Brigadier General and command pilot in the U.S. Air Force and Air National Guard, Inglis also held academic and advisory roles, including as a commissioner on the U.S. Cyberspace Solarium Commission and a trustee of the National Intelligence University. His accolades include the President’s National Security Medal and the Director of National Intelligence Distinguished Service Medal. Inglis holds advanced degrees in engineering and computer science from Columbia, Johns Hopkins, and George Washington University. He resides in Annapolis, Maryland, with his wife, Anna.


Daniel Blackford
Daniel Blackford | Sr. Director, Threat Research, Proofpoint, Inc.

Formerly a researcher himself, Daniel currently leads Proofpoint's threat research team devoted to tracking financially-motivated actors. From high-profile botnets to credential harvesting and business email compromise, Daniel's team is in the weeds everyday leveraging Proofpoint's world class visibility to make high-confidence attributions and to share their findings with defenders across the world. Prior to his work at Proofpoint, Daniel worked as a malware analyst at the NCFTA and got his start tracking adversaries as a combat engineer with the US Army.



Cristiana Kittner
Cristiana Kittner | Sr. Manager, Threat Research, Proofpoint, Inc.

Cristiana leads eCrime research at Proofpoint, bringing deep expertise in APT tracking, election interference, and Asia-pacific cyber ops from a background in military and defense analysis.

Protecting Sensitive Data

While protecting people and those who access and use data is important, we also need to think about how we go about defending data. Reactively following data movement is not enough. We need to fully understand the context, behaviours and threats associated with data before we can become successful defenders of data.

Identity is the New Attack Surface

Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.

Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk

Building a Strong Security Culture

According to Proofpoint’s 2023 State of the Phish Report, only 56% of organisations have conducted formal security awareness training. And yet, 58% of employees know what the term Phishing is, which suggests that training alone may not be as effective as we want it to be. Moreover, most people believe it’s the cybersecurity team’s sole responsibility to keep the organisation safe. It’s a common challenge for security professionals to change that mindset.

Having a strong security culture can not only help drive behavior change but also impact what users believe. So how can your organisation go beyond training and start building a security culture?

Improving M365 Security with Proofpoint

Many organisations utilize bundled security offerings from Microsoft and run under the assumption that Microsoft security is “good enough” or feature comparable to purpose-built security platforms. Security leaders often struggle to justify specific security spend outside of Microsoft and are desperate for ways to prove the value of security platforms versus simply using what is built-in to the Microsoft ecosystem. We must implement modern and practical requirements when designing a data security governance approach.

CISO Perspectives on Supply Chain and Third Party Risk

Tabletop exercises may uncover some supply chain and third-party risks. But few organisations doing them last year could have foreseen the effects of geopolitical conflict. Add to the mix a myriad of new risks—from cloud-based solutions to hybrid work environments and remote work—and CISOs have a lot to deal with. CISOs can transfer some responsibility for risks to cloud and third-party vendors. Ultimately, however, they’re accountable when it comes to keeping their organisations safe.

Mitigating Data Loss and Insider Threats

Insider threats are the top cybersecurity concern among chief information security officers (CISOs) globally, according to the Proofpoint 2022 Voice of the CISO report. Digital transformation, work-from-anywhere environments and employee turnover are increasing insider risk. As the modern way of working shifts, more data is generated and cloud adoption accelerates, CISOs are questioning if their legacy solutions can meet today’s demands. There is one constant factor among these ongoing shifts: people. After all, data doesn’t lose itself; people lose data. And more than half the time, insider threats can be attributed to careless users.

Break the Attack Chain

Identities are a company’s crown jewels when it comes to access and privileges to corporate systems. And attackers know the power they have if identities are compromised. Compromised identities can result in data exfiltration, takeover over IT environments, or launch of ransomware attacks.

Research has shown that 51% of organisations have suffered a breach or attack due to employees with unnecessarily high permissions. And 16% of organisations have suffered a breach or attack due to malware designed to dump cached credentials from devices. In fact, 1 in 6 endpoints contain vulnerable identity risk.

Augment M365 Defence

Few tools are as critical to modern business as Microsoft 365. Unfortunately, the platform’s reach and central role in the workplace also make it a prime target for cyber attackers. That’s why experts such as Gartner and Forrester recommend augmenting Microsoft 365’s native security features with complete email, cloud and data protection. We’ll explore new people-centric approaches to threat protection, identity defence and data loss prevention (DLP) to safeguard your Microsoft 365 investment.

Stop Insider Risks From Turning Into Insider Threats

Not every insider risk turns into an insider threat, but every insider threat began as an insider risk. Almost two-thirds—63%—of global CISOs say they have had to deal with the loss of sensitive information in the past year, according to the Proofpoint 2023 Voice of the CISO report. That’s why security leaders need an insider risk mitigation program that encompasses people, processes and technology for successful early intervention, detection and mitigation of insider threats.

Year in Review and Predictions

2023 was a year of explosive change in the cybersecurity arena as the cyber attack chain—and the landscape as a whole—evolved on several fronts. As we head into 2024, threat actors are still experimenting at warp speed. In this Power Series, we’ll discuss what we saw this year, what’s coming in 2024 and what it all means for your cybersecurity program.

Defending Against Ransomware and BEC

Ransomware is one of today’s most disruptive forms of cyber attacks, and business email compromise (BEC) is one of the costliest. Modern organisations need a cybersecurity solution that addresses these and other threats across the entire attack chain. Learn how a people-centric approach powered by AI can help break the attack chain and stop email attacks and initial compromise.

Transform Users into Defenders

According to the 2024 State of the Phish Asia-Pacific and Japan, email compromise (BEC) is spreading rapidly across the region with 73% of organisations experiencing a BEC attack, yet only 29% of companies teach their users how to identify BEC. As attackers refine their tactics—from sophisticated MFA bypass techniques to telephone-oriented attacks and QR-code phishing—equipping users for today’s threats has never been more critical.

Prepare for the e-Pocalypse

What if customers simply stopped getting your company’s emails? Organisations may face that scenario after three of the biggest email providers—Gmail, Apple, and Yahoo—announced new email authentication requirements, including DMARC.

Identity Security Gaps and Threats

More than 80% of cyberattacks—including ransomware and data exfiltration—rely on exploiting a privileged identity. Although organisations spent nearly $20 billion per year on identity and access management (IAM) tools in 2023 alone, attackers are still getting through. Why are existing security approaches not doing the job and stopping attackers in the middle of the attack chain? In this Power Series webinar our experts explore the gaps between common security strategies and today’s highly successful attacks.

Strengthening M365 with Human-Centric Security

Microsoft’s native and add-on email security capabilities help to protect basic email-based threats, but they aren’t enough to ensure full protection. Today’s integrated cyber attacks target people and not just technology. Join us and learn why an effective defense against modern threats like business email compromise, advanced phishing, social engineering attacks, impersonation abuse, and accidental data loss require a human-centric security approach to fortify Microsoft 365 email defenses.

Year in Review and Predictions

2024 was a year of explosive change in the cybersecurity arena as cyber attackers honed their sights on exploiting humans and their identities. As we kick start into 2025, threat actors are increasingly using digital collaboration channels and the web, and the cloud to launch attacks, creating threat risk, identity sprawl, and data exposure in new ways.

In this Power Series, we’ll discuss what we saw in 2024, what’s coming this year and what it all means for your cybersecurity program.

Managing Insider Risk

Insider threats continue to increase and make headlines. So, it is no surprise that many CISOs consider it a high priority to proactively identify and prevent these types of threats. In fact, research from the 2024 Proofpoint Voice of the CISO report found that a third of CISOs globally see insider threats as their biggest cybersecurity threat over the next 12 months.

Human-Centric Cybersecurity

Cybersecurity risks don’t take the holidays off, so Proofpoint’s engineering and threat research teams have been hard at work on our latest innovations to help you protect your people and defend your data as we dive into 2025. Gartner called out pivoting to human-centric security as one of the top three CISO priorities for both 2024 and 2025, so we’ll unpack what that means in practice for security leaders and practitioners.

From Security Awareness to Action

Cyber threats are constantly evolving, and with the rise of generative AI, threat actors are finding new ways to exploit human vulnerabilities. As organisations strengthen their security controls and awareness training, one challenge remains—people often knowingly bypass security measures for convenience, efficiency, or to meet tight deadlines.

Modernising Legacy DLP

Organisations experience more than one data loss incident per month, according to recent research. Business disruption, damaged reputation or regulatory fines almost always follow. Legacy DLP solutions cannot adequately address today’s most worrisome use cases, such as protecting cloud and endpoint data, as well as ensuring the acceptable use of GenAI tools. Forward-looking enterprises are actively modernising their data loss prevention programs by employing a human centric approach that provides visibility into users’ data access patterns across all applications and channels.

Inside the Threat Landscape

The cybersecurity landscape is constantly evolving as threat actors refine their tactics, develop new tools and delivery methods, and harness the power of artificial intelligence (AI). From crafting more convincing lures in previously hard-to-master languages to engineering creative attacks and executing custom social engineering schemes, their capabilities are advancing at an alarming pace. However, this evolution isn’t limited to attackers. Organisations face growing challenges in managing digital identities, navigating multi-cloud environments, and adapting to decentralised data strategies. With regulations demanding stric

Maximising Threat Protection Investment

As digital workspaces continue to expand, human-centric security challenges are becoming more complex. While email remains the primary threat vector, cybercriminals are increasingly targeting new channels, such as collaboration tools, messaging platforms, and file-sharing services, to exploit social engineering tactics. This has resulted in a fragmented security landscape, with disconnected point solutions that create gaps in risk mitigation and complicate integration and management efforts. How can your organization strengthen its security strategy while improving cost efficiency?

Demystifying Microsoft’s Data Security Capabilities

Building a robust data security program requires the right combination of people, processes, and technology. However, organizations struggle to justify increased investments in data security programs in 2025. It’s imperative to understand how Microsoft Purview can meet organizational requirements or create additional gaps in your data security posture and effectiveness. Whether you’re beginning your DLP journey or encountering challenges with a stalled Microsoft deployment, you don't want to miss this program.

Transforming Your Data Security Strategy

Organisations face growing data security challenges. The average company manages over 100 terabytes of data, making it increasingly difficult for security teams to keep pace, especially as more applications are purchased and used outside of IT. This leads to increased data sprawl, reduced visibility, and more ways for data to be put at risk.

Data Security Landscape

Protecting data across APAC has never been more complex—or more critical. Rapid cloud adoption, accelerated use of generative AI, and a constantly evolving regulatory landscape are increasing the risk of data exposure across the region. Join us for an exclusive look at the Proofpoint 2025 Data Security Landscape report, featuring new survey findings and Proofpoint threat intelligence that highlight the key drivers of data loss in APAC and globally, emerging AI-related risks, and how organisations are adapting.

(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.

Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organisation’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.