• Days
  • Hours
  • Minutes
  • Seconds

The event has already taken place, thanks for checking!

Aired on Wednesday, April 12, 2023
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

CISO Perspectives on Supply Chain and Third-Party Risk

Tabletop exercises may uncover some supply chain and third-party risks. But few organizations doing them last year could have foreseen the effects of geopolitical conflict. Add to the mix a myriad of new risks—from cloud-based solutions to hybrid work environments and remote work—and CISOs have a lot to deal with. CISOs can transfer some responsibility for risks to cloud and third-party vendors. Ultimately, however, they’re accountable when it comes to keeping their organizations safe.

The good news is that third-party risk is no longer a new topic. The same frameworks that CISOs use to assess their internal risk can be applied to vendors. In fact, companies with thousands of vendors often create risk-based tiering for their third-party processes. In addition, new cybersecurity solutions and features can reduce the level of effort required. With a little trial and error, CISOs can design a third-party risk program that aligns with their business needs.

In this Power Series, our panel of resident CISOs will discuss:

  • The impact of supply chain and third-party risk in a hybrid world
  • How to identify shadow IT and reduce hidden third-party risk
  • Ways to build or upgrade your third-party risk program to adapt to today’s evolving risks

Get Your Power Series Gift!

After the event, we’ll be giving away a Tile Sticker Bluetooth Tracker* to the first 1,000 qualified attendees who place an order.

Power Series Gifts are only available to qualified attendees** in the U.S. or Canada.

Rutrun Vehicula Fermentum Lacinia Enim


Lucia Milica Stacy
Lucia Milică Stacy | VP, Global Resident Chief Information Security Officer, Proofpoint, Inc.

Lucia Milică Stacy serves as VP, Global Resident Chief Information Security Officer at Proofpoint, a leading cybersecurity and compliance company. She is a senior technology leader with over 20 years of extensive technical and business experience. In her previous role, Lucia was the VP, Chief Information Security Officer & Chief Privacy Officer for Polycom, where she managed all aspects of data privacy and information security. She has also held leadership and technical roles in IT governance & strategy, security risk and compliance, corporate and product security, data privacy, and IT infrastructure at other companies, including HP, Palm, Wells Fargo, and Franklin Templeton. Many organizations in the cybersecurity industry and broader business community have asked her to speak at their conferences, symposiums, and other events. She has also extended her contributions to her profession by serving as an advisory board member and active participant with the cybersecurity industry and relevant industry groups, including board membership on the National Technology Security Coalition, and service with the Department of Health and Human Services (HHS) 405(d) Cybersecurity Task Group, SC Media Advisory Board, and Forbes Technology Council. She has a Master of Science in Information and Cybersecurity degree from the University of California, Berkeley. She also holds Master in Business Administration and Juris Doctorate degrees.

Featured Panelists

John Checco
John Checco | Resident CISO, Financial Services, Proofpoint, Inc.

John C. Checco is an information security professional providing subject matter expertise across various industries. He is currently a leader for the CISO Advisory Board on Financial Services for Proofpoint and President Emeritus of the New York Metro InfraGard Members Alliance (an FBI public/private partnership program). Checco has been an active contributor to the Strategic Advisory and Content Committee of the WSTA (Wall Street Technology Association) since 1997, active in InfraGard’s New York Metro Chapter since 2003. He is also a member of several other security organizations (ASIS, ISSA, IASCP, ISC2 and OWASP), and co-founder and co-chair of the New York Metro Joint Cyber Security Conference and Workshop series since 2014. Prior to his current role, Checco served in an executive capacity with Bank of America’s Global Information Security Innovation Group and as Senior Information Security and Risk Advisor for Bloomberg L.P. He is founder of Checco Services Inc., an information security consulting firm that patented the award-winning bioChec™️ keystroke and gesture biometric technologies.

Andrew Rose
Andrew Rose | Resident CISO, EMEA, Proofpoint, Inc.

Andrew has joined Proofpoint from Mastercard, where he was the Chief Security Officer of their subsidiary firm, Vocalink, a firm which provides the transactional backbone of the financial services industry in the UK. Prior to that Andrew held the CISO role at the UK Air Traffic Control provider, NATS, where he oversaw a security transformation and contributed to the design of the next generation air traffic control system. Andrew has also held CISO roles at two top tier global law firms, Allen Overy LLP and Clifford Chance LLP. In between these roles, Andrew was a Principal Analyst at Forrester Research where he covered the role of the CISO and Security Culture & Awareness as two of his specialty areas. Andrew was recognized as European CISO of the year (2018) and has previously won awards for devising and leading the Best security awareness program (2015). Andrew holds a master’s degree in information security, is a regular speaker at global security conferences (including RSA in 2019) and has contributed to media outlets such as the Wall Street Journal, the Financial Times, the Washington Post, Wired magazine and the Times newspaper. Andrew also appeared in the CNBC documentary entitled Rise of the Machines.

Deborah Watson
Deborah Watson | Resident CISO, Proofpoint, Inc.

Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah has worked with both public and private sector organizations across the Fortune 1000 as an employee or consultant. Deborah has a Master’s degree in Information Technology Management from Harvard University and is a Doctoral Candidate in Psychology (PsyD) at California Southern University. Ms. Watson has published papers and presented on a variety of topics including GDPR, IoT, BEC and Phishing, Third-Party Risk Management, and Open Source Security.

Aired on Wednesday, May 17, 2023
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

Mitigating Data Loss and Insider Threats

Insider threats are the top cybersecurity concern among chief information security officers (CISOs) globally, according to the Proofpoint 2022 Voice of the CISO report. Digital transformation, work-from-anywhere environments and employee turnover are increasing insider risk. As the modern way of working shifts, more data is generated and cloud adoption accelerates, CISOs are questioning if their legacy solutions can meet today’s demands. There is one constant factor among these ongoing shifts: people. After all, data doesn’t lose itself; people lose data. And more than half the time, insider threats can be attributed to careless users. These users unknowingly or unintentionally impact an organization’s data or systems negatively.

In this Power Series, our panel of experts will discuss:

  • How to identify common DLP and insider threat use cases
  • How context helps prevent data loss and insider threats
  • The importance of a program-first approach supported by strong technology controls
  • Best practices for building DLP and Insider Threat programs

Get Your Power Series Gift!

After the event, we’ll be giving away a New Balance Logo Round Backpack* to the first 1,000 qualified attendees who place an order.

Power Series Gifts are only available to qualified attendees** in the U.S. or Canada.

Rutrun Vehicula Fermentum Lacinia Enim


Brian Reed
Brian Reed | Sr. Director of Cybersecurity Strategy, Proofpoint, Inc.

Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.

Featured Panelists

Lyn Campbell
Josh Linkenhoker | Field Security Architect, Sigma, Proofpoint, Inc.

Josh Linkenhoker is an information security leader who works with organizations to build comprehensive information security programs. On every project, Josh sees his role as a partner and educator. His goal is to increase the understanding of everyone he works with by building trust and confidence. Josh’s approach to security is business-first. He believes that every security project should be set up in a way that prioritizes business performance and fidelity. And while security controls are important for protecting the business, they shouldn’t impede business operations. Josh has held multiple enterprise director level roles where he has overseen information security teams that focus on information protection, cloud security and email security. During his work as a consultant, he specialized in building successful information security programs for enterprise organizations. His career began in the public sector where he served as a leader in the U.S. Military Intelligence Corps. Since then, he has touched all verticals in the private sector. Today, Josh focuses on building programs that identify and secure data at rest in the environment. His programs feature solid data loss prevention controls on the edge that keep sensitive data inside the environment. And these programs extend to the cloud and SaaS products. With every program, his goal is to ensure that companies can do business any way they want to, safely and securely, and in partnership with compliance, legal, and other stakeholders.

Stephanie Torto
Stephanie Torto | Sr. Product Marketing Manager, Proofpoint, Inc.

Stephanie is a Senior Product Marketing Manager at Proofpoint, where she is responsible for the messaging and positioning of its Insider Threat Management and Endpoint Data Loss Prevention solutions. Before joining Proofpoint, Stephanie held a variety of roles spanning product marketing, customer research, and market strategy at IBM. Prior to IBM, Stephanie spent several years as an industry analyst at IDC, providing insights and advice on market trends and industry dynamics to executives at leading technology and IT services firms. Stephanie holds a BA degree from Union College and an MBA from Babson College.

Jeremy Wittkop
Jeremy Wittkop | Principal Security Architect, Proofpoint, Inc.

Jeremy Wittkop is Proofpoint’s Principal Security Architect. As InteliSecure’s former Chief Technology Officer, Jeremy was a foundational architect for InteliSecure’s internationally recognized Data Protection, Cloud Security, and User and Entity Behavior Analytics Services. Jeremy is a trusted data protection thought leader -- published author, blogger, public speaker, and advisor to clients and formerly public and private equity investors.

Zoom | Wednesday, June 14, 2023
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

Cloud Security and Information Protection Strategies

Cloud applications and information stored in or hosted in the cloud have become mainstream for most organizations. As adoption continues, we must focus on security in these modern modes of application usage and information sharing to adequately protect people and organizations from threats, data loss and compliance risk.

Join our panel of experts in this Power Series to learn:

  • The greatest cloud security risks that organizations face
  • How are cloud security and information protection intertwined
  • Best practices for cloud security and protecting information in cloud applications and storage

Get Your Power Series Gift!

After the event, we’ll be giving away a Nike Dri-Fit Swoosh Perforated Cap*  to the first 1,000 qualified attendees who place an order.

Power Series Gifts are only available to qualified attendees** in the U.S. or Canada.

Rutrun Vehicula Fermentum Lacinia Enim


Ron Poserina
Ron Poserina | Vice President, Americas Systems Engineering, Proofpoint, Inc.

Ron is the Vice President, Americas Systems Engineering at Proofpoint. In his current role, he is responsible for leading the technical sales organization in helping customers solve their evolving cyber security challenges. As a 15 year veteran in this space, Ron has worked with some of the largest companies in the world advising them on managing risk. He also holds CISSP and CCSK certifications. Prior to joining Proofpoint, Ron lead systems engineering teams at a number of other cyber security organizations. His specialties have included email messaging, web security and DLP.

Featured Panelists

Lyn Campbell
Erin Leonard | Global Director of Sales Engineering, Sigma Information Protection, Proofpoint, Inc.

Erin Leonard is Proofpoint’s Global Director of Sales Engineering for Sigma Information Protection. She has more than 15 years of experience with Information & Cyber Security, focused on enterprise risk and remediation. She started her career in enterprise compliance at Fidelity Investments and Iron Mountain Records Management before spending 10 years at RSA Security, focused on the Archer Governance, Risk and Compliance business. Erin’s background as a systems administrator, Professional Services consultant and Presales technical leader of security technology has given her the ability to view risk from people, process and technology perspectives. Erin graduated from the University of Vermont and received her MBA from Bryant University and her MSCIS from Boston University. She lives in the Boston area and has a passion for exercise and running – she has completed 8 full marathons including Boston, Chicago, Berlin and NYC.

Rob Randell
Rob Randell | Senior Director, Global ATG Systems, Proofpoint, Inc.

Rob Randell is currently Global SE Director for Proofpoint's Advanced Technology Group. In this role, he leads a team of Systems Engineers and Architects to help customers and partners get the most out of Proofpoint's advanced technologies, including Information Protection, Cloud Security, Security Awareness Training, and Email Fraud Defense. Before Proofpoint, Rob was a Director in the Security and Risk Practice at ServiceNow. Rob is a regular speaker at different events, from local ISSA Meetings to larger security conferences such as the RSA Conference. Rob's career has been deep into information security through several avenues. Virtualization security and micro-segmentation through the hypervisor at VMware, endpoint memory-based protection with startup Determina (acquired by VMware), anti-malware at Webroot, and before that Vericept, which was the original player in the DLP space.

Denis Ryan
Denis Ryan | Vice President, Information Protection and Cloud Security Sales, Proofpoint, Inc.

Denis Ryan is Vice President, Information Protection and Cloud Security Sales for Proofpoint, Inc. Previously, Denis held management positions at several well-known technology companies, including Nominum (now part of Akamai), Tellabs (now Coriant), Verizon and IBM. As a sales leader of the fastest growing business unit in Proofpoint, Ryan oversaw the go- to- market sales and sales engineering strategy after the Return Path business unit acquisition. Ryan’s diverse background in IT and security solutions enables him Ryan to overlay the Proofpoint sales efforts in multiple verticals, most notably Healthcare, as Proofpoint has ramped up this specialized team to improve email authentication practices. He resides in the Dallas-Fort Worth metroplex, mentors undergraduates for his alma mater (University of Dallas) and volunteers his time for various local charities.

(ISC)2 CPE Logo

Earn Cybersecurity CPE Credits - ISC2

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.

Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). 

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Offer subject to availability. These gifts are a $25 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.

**Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organizations within US and Canada. This gift is not available to independent consultants or channel or technology partners.