Compliance Learnings - GameStop & Financial Markets


The army of millions of investors from Reddit's WallStreetBets community pushed GameStop (GME) shares from US$20 to US$480 during the January “short squeeze”, in which they drove hedge funds like Melvin Capital into heavy losses, after forcing them to liquidate massive bets against the stock. This moment in history is empowering industry experts to review the compliance landscape and evaluate the impact of financial performance indicators vs. digital media influence on our financial markets today.

Join this Power Series to learn more about:

  • The GameStop case study
  • The state of electronic communications used within Financial Services and regulated industries
  • Compliance learnings in today’s digital media usage and its governance
  • Leveraging new innovations to legitimately supervise and regulate markets

Get Your Power Series Summer Gift!

To celebrate summer with our security community, each qualified attendee* will have the option to order their own complimentary Power Series Summer Gift** after the event, selecting from a Cuisinart Charcoal Grill, a Unicorn Pool Floatie, or a The North Face Duffel.

*If you cannot accept or wish not to accept the Power Series Summer Gift, please make sure to decline upon registering. Power Series Summer Gifts are only available to qualified attendees in the U.S. or Canada.


Rutrun Vehicula Fermentum Lacinia Enim

FEATURED HOST

Jasmine Wu
Jasmine Wu | Director, Product Marketing, Proofpoint, Inc.

Jasmine Wu is the Director of Product Marketing at Proofpoint. She has over 13+ years of experience providing thought leadership and advisory in the emerging technologies space, including corporate risk protection, information governance, cloud collaboration management, and digital transformation. .

FEATURED SPEAKERS

John Pepe
John Pepe | Resident Chief Compliance and Regulatory Officer, Proofpoint, Inc.

John Pepe is Proofpoint's Resident Chief Compliance and Regulatory Officer at Proofpoint Archiving and Compliance where he helps customers solve legal, compliance and regulatory challenges using industry best practices and the latest analytics tools. John holds a Law Degree with a concentration in Corporate and Securities Law from Rutgers Law School and holds FINRA Series 7, 24, and 4 Principal registrations. Prior to joining Proofpoint, John was a financial services compliance officer and is still very active as an industry advisor to asset managers, banks, and brokerages.


Shawn Aquino
Shawn Aquino | Sr. Product Marketing Manager, Proofpoint, Inc.

Shawn Aquino is a Senior Product Marketing Manager with primary focus on Proofpoint Enterprise Archive, E-Discovery Analytics, Intelligent Supervision and NexusAI for Compliance. Prior to Proofpoint, he held senior product marketing and product management roles at Pure Storage, Veritas Technologies, Symantec, Commvault and HP. Shawn earned his Bachelor of Science in Business Management (Marketing Concentration) from San Jose State University.



Don’t Be the Next Victim


Ransomware is one of the most disruptive forms of cyber attacks, putting supply chains out of business, forcing hospitals to turn away patients, and bringing entire city governments and municipalities to a standstill. Not only is it a top concern for CISOs, it has become a national security issue. Business email compromise (BEC) and email account compromise (EAC) are also a large and growing problem having huge cost impacts to businesses. Attackers are getting more sophisticated and bolder in their approach exposing organizations to billions of dollars in potential losses. Today’s organizations need an integrated, orchestrated solution that addresses all attackers’ tactics, provides visibility into malicious activities and user behavior, and automates detection and threat response.

Join this Power Series to learn more about:

  • Why ransomware remains a top cybersecurity threat
  • Key ways ransomware threat actors get into your organization, and how to stop them
  • How Proofpoint has seen and prevented BEC attempts that are larger than 7 figures in size
  • Applying a people-centric approach, identifying the risky supply chain partner impersonation all the way down to who was targeted in your organization
  • Best practices to defend against BEC and EAC and get ahead of ransomware

Get Your Power Series Summer Gift!

To celebrate summer with our security community, each qualified attendee* will have the option to order their own complimentary Power Series Summer Gift** after the event, selecting from a Cuisinart Charcoal Grill, a Unicorn Pool Floatie, or a The North Face Duffel.

*If you cannot accept or wish not to accept the Power Series Summer Gift, please make sure to decline upon registering. Power Series Summer Gifts are only available to qualified attendees in the U.S. or Canada.



Rutrun Vehicula Fermentum Lacinia Enim

FEATURED HOST

Tim Choi
Tim Choi | Vice President, Product Marketing , Proofpoint, Inc.

Tim Choi is responsible for product marketing of all products and solutions at Proofpoint. Prior to Proofpoint, he was a member of the product management leadership team at BlackBerry and was part of the turnaround journey of the company to software and security. Choi also led product management and product marketing at WatchDox (acquired by BlackBerry) and product initiatives for VASCO’s cloud authentication services. Choi started his career as the first employee at Voltage Security (acquired by HP), where he held leadership roles in product management, technical sales, services and business development. He has a B.S. degree in Electrical Engineering and M.S. degree in Management Science and Engineering, both from Stanford University.

FEATURED SPEAKERS

Ron Poserina
Ron Poserina | Vice President, Americas Systems Engineering, Proofpoint, Inc.

Ron is the Vice President, Americas Systems Engineering at Proofpoint. In his current role, he is responsible for leading the technical sales organization in helping customers solve their evolving cyber security challenges. As a 15 year veteran in this space, Ron has worked with some of the largest companies in the world advising them on managing risk. He also holds CISSP and CCSK certifications. Prior to joining Proofpoint, Ron lead systems engineering teams at a number of other cyber security organizations. His specialties have included email messaging, web security and DLP.

Denis Ryan
Denis Ryan | Senior Director, Field Sales, Proofpoint, Inc.

Denis Ryan is Senior Director, Email Fraud for Proofpoint, Inc. Previously, Denis held management positions at several well-known high-tech companies including Nominum (now part of Akamai), Tellabs (now Coriant), Verizon and IBM. As a sales leader of the fastest growing business unit in Proofpoint, Ryan oversaw the go to market sales and sales engineering strategy post the Return Path business unit acquisition. The diverse background of IT and security solutions allows Ryan to overlay the Proofpoint sales efforts in multiple verticals, most notably Healthcare as Proofpoint has ramped this specialized team to improve email authentication practices. He resides in the Dallas-Fort Worth metroplex, mentors undergraduates for his alma mater (University of Dallas) and volunteers his time for various local charities.

Biggest & Boldest Insider Threats


Insider threats come in all shapes and sizes and affect organizations across all industries and geographies. Understanding the motives behind them is key to defense. One of the best ways to do this is to study some of the bold, headline-generating insider threats that have taken place, like the big Twitter debacle of 2020. This is just one example of what has become a very common problem.

Join this Power Series as we discuss:

  • The stories behind the biggest and boldest insider threats to date
  • Practical security tips inspired by these real-world breaches
  • Why contextual intelligence is important to establish intent
  • How to accelerate incident response and triage what really matters

Get Your Power Series Summer Gift!

To celebrate summer with our security community, each qualified attendee* will have the option to order their own complimentary Power Series Summer Gift** after the event, selecting from a Cuisinart Charcoal Grill, a Unicorn Pool Floatie, or a The North Face Duffel.

*If you cannot accept or wish not to accept the Power Series Summer Gift, please make sure to decline upon registering. Power Series Summer Gifts are only available to qualified attendees in the U.S. or Canada.



Rutrun Vehicula Fermentum Lacinia Enim

FEATURED HOST

Brian Castello
Brian Costello | Regional Sales Director, Information Protection, Proofpoint, Inc.

Brian Costello joined Proofpoint in November 2019 from the ObserveIT acquisition. During his time at ObserveIT he was responsible for building out the North American Market where he worked directly with ObserveIT’s largest customers in all sectors – providing them with insight and solutions to their insider threat challenges. Today, Brian is the Regional Sales Director for Information Protection at Proofpoint where he continues to educate customers on the importance of protecting their data against accidental mistakes, attacks and insider risk. In his past life, Brian was a tennis pro teaching the sport to the rich & famous like Conan O’Brien and Ari Emannuelle (the real Ari Gold from Entourage). Please no autographs.

FEATURED SPEAKERS

Brian Reed
Brian Reed | Information Protection Evangelist, Proofpoint, Inc.

Brian Reed is our Information Protection Evangelist at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Previous to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.

Michael Gordover
Michael Gordover | Principal Sales Engineer, Proofpoint, Inc.

Michael Gordover is a Principal Solutions Architect for Proofpoint, specializing in Insider Threat. He is a seasoned security professional, CISSP, and Insider Threat Program Manager. Michael has been with ObserveIT for 7 years, working with organizations across various industries and verticals- consulting on, and implementing data governance and insider threat solutions as well as securing ObserveIT internally as part of the Info Sec team.

Modern Blueprint to Information Protection


As companies migrate to the cloud and embrace remote or flex work, increasing amounts of sensitive data is leaving the corporate perimeter. Legacy approaches to data-loss prevention (DLP) and building walls around your critical data fails in today’s always-connected world. With regulations and data breaches on the rise, it’s time to modernize Enterprise DLP to protect sensitive data across key channels of data loss - email, cloud, web, and endpoint.

Watch this Power Series to learn about:

  • Why it is harder than ever to protect your data
  • Need to replace legacy DLP with a unified Information and Cloud Security Platform
  • Best practices to implement an Enterprise DLP solution and defend your high-value data

Rutrun Vehicula Fermentum Lacinia Enim

Featured Host

Itir Clarke
Itir Clarke | Manager, Product Marketing, Proofpoint, Inc.

Itir Clarke is a Product Marketing Manager for Proofpoint's Cloud App Security solutions. Before coming to Proofpoint, Itir worked with data center products at Cisco, Brocade and Sun Microsystems before that. Itir has over 20 years of information technology experience in Product Marketing and Management roles.

Featured Panelists

Jeremy Wittkop
Jeremy Wittkop | Sr. Director, Technology Services, PCMS, Proofpoint, Inc.

Jeremy Wittkop is Proofpoint’s Senior Director of Technology Services for the People-Centric Managed Services group. As InteliSecure’s former Chief Technology Officer, Jeremy was a foundational architect for InteliSecure’s internationally recognized Data Protection, Cloud Security, and User and Entity Behavior Analytics Services. Jeremy is a trusted data protection thought leader -- published author, blogger, public speaker, and advisor to clients and formerly public and private equity investors.


Justin Collins
Justin Collins | Senior Director, Professional Services, Proofpoint, Inc.

Justin leads Proofpoint’s Information Security Professional Services Practice and has been with Proofpoint for 14 years having worked with customers of all sizes during that time. Justin has 20+ years of security, networking and large-scale operations experience having worked at such organizations as NASA, Microsoft, and eBay. Justin has a Bachelor’s Degree in Physics from the University of Rochester.

Future-Proofing Your Cloud Security Architecture


Traditional perimeter-based security cannot address the complexity of hybrid work, BYOD strategies and the evolving threat landscape. This new reality requires a cloud security architecture that protects traditional IT infrastructure, along with cloud services, and supports a range of users, networks, and devices. Secure Access Service Edge (SASE) security model intends to deliver on this premise by consolidating various security services into a single platform that is highly scalable and easy to manage.

Watch this Power Series to learn:

  • What SASE architecture is and its key security components
  • The benefits of a SASE-ready architecture
  • How Proofpoint can help future-proof your security architecture

Rutrun Vehicula Fermentum Lacinia Enim

Featured Host

Rob Randell | Director, Sales Engineering, Proofpoint, Inc.

Rob Randell is currently Global SE Director for Proofpoint's Advanced Technology Group. In this role, he leads a team of Systems Engineers and Architects to help customers and partners get the most out of Proofpoint's advanced technologies, including Information Protection, Cloud Security, Security Awareness Training, and Email Fraud Defense. Before Proofpoint, Rob was a Director in the Security and Risk Practice at ServiceNow. Rob is a regular speaker at different events, from local ISSA Meetings to larger security conferences such as the RSA Conference. Rob's career has been deep into information security through several avenues. Virtualization security and micro-segmentation through the hypervisor at VMware, endpoint memory-based protection with startup Determina (acquired by VMware), anti-malware at Webroot, and before that Vericept, which was the original player in the DLP space.

Featured Panelists

Rob Randell
Brian Reed | Director of Cybersecurity Strategy, Proofpoint, Inc.

Brian Reed is Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.


Rob Smith
Rob Smith | Cybersecurity Advisor, Proofpoint, Inc.

Rob Smith advises Proofpoint on the latest trends and innovations in cybersecurity to assist in keeping Proofpoint as an industry thought leader and innovator. Prior to joining Proofpoint, he was lead analyst for remote access and covered endpoint security and management for Gartner. Mr. Smith was author of numerous industry leading research documents including Magic Quadrants, Hype Cycles, and Cool Vendor documents where he defined the cybersecurity industry and its future. He also founded the world’s largest dedicated MSSP and numerous other successful cybersecurity start-ups where he authored 7 industry patents covering VPN access and endpoint security.

E-Discovery Beyond Email


Ever wonder how your legal and compliance teams may be preparing to respond to the aftermath of controversial tweets from an executive or rogue employee? While email is not expected to go away and will remain a primary communication channel when it comes to corporate electronic discovery (e-discovery) requests and internal investigations, the rapid adoption of social and collaboration platforms (for example, Microsoft Teams, Twitter, LinkedIn) in the ongoing work from home environment is challenging organizations to rethink their e-discovery and compliance strategy. In many instances, the processes and technology of yesterday are no longer sufficient to address today’s evolving requirements.

Watch this Power Series to learn more about:

  • Digital communication channels now factoring into e-discovery
  • IT, Legal and Compliance challenges when deploying these new channels
  • Best practices for mitigating risk

Rutrun Vehicula Fermentum Lacinia Enim

Featured Host

Ryan Kalember
Ryan Kalember | EVP, Cybersecurity Strategy, Proofpoint, Inc.

With 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people and the best defenses they can implement to mitigate them. Mr. Kalember joined Proofpoint from WatchDox where he served as chief product officer, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms. Throughout his career, Ryan has provided cybersecurity counsel to global government delegations including Jordan, North Macedonia, Peru, and Spain, and is a board member of the US National Cyber Security Alliance and the Cybersecurity Technical Advisory Board. As a result, he is a go-to source for breaking security news, regularly providing insight to Sky News, CBS This Morning, BBC News, Bloomberg, Bloomberg Radio, CNBC, Forbes, Fortune, NBC Nightly News, USA Today, WIRED, Vox, and The Economist.

Featured Panelists

Melanie Taylor
Melanie Taylor | Senior Vice President, LPL Financial

Melanie Taylor is a Senior Vice President at LPL Financial in Fort Mill, South Carolina. Melanie leads a group of professionals who are responsible for the risk oversight of several areas, including electronic communications and offshore operations. Prior to joining LPL, Melanie was Vice President, Compliance at Ameriprise Financial, with similar responsibilities. She is Series 7 and Series 24 licensed.


Phillip Favro
Philip Favro | eDiscovery and InfoGov Consultant, Driven, Inc.

Philip Favro is a Chambers-ranked lawyer who serves as a trusted advisor on issues relating to electronic discovery and information governance. He serves as a special master and an expert witness on cases involving electronically stored information. Phil provides clients with guidance on data preservation practices, litigation holds, data collection strategies, and ESI search methodologies. Phil also offers direction on records retention policies, litigation hold policies, and the need to manage dynamic sources of information found on messaging applications and workplace collaboration tools. Phil is a leading expert on ephemeral messaging, advises Driven clients regarding risk and compliance issues, and served as editor-in-chief for the newly published Sedona Conference Commentary on Ephemeral Messaging. Prior to joining Driven, Phil practiced law in Northern California where he advised a variety of clients regarding business disputes and complex discovery issues.


Shannon Smith
Shannon Smith | Regional Director, Compliance & Archiving, Proofpoint, Inc.

Shannon Smith has worked at the crossroads of technology and the law for over a decade and understands the risk and challenges organizations face in managing increasing volumes of data. As Regional Director, Compliance & Archiving, Smith consults with clients on leveraging Proofpoint’s industry-leading archiving platform to capture, manage and discover data related to litigation, internal investigations and regulatory inquiries. Prior to joining Proofpoint, Smith worked with organizations to develop policies and processes to support information governance programs including complex retention policies, defensible litigation hold processes and repeatable eDiscovery workflow. As an experienced attorney, Smith brings an extensive knowledge of regulatory compliance, litigation readiness, and records management issues to her role.

(ISC)2 CPE Logo

Earn Cybersecurity CPE Credits - ISC2

This event is approved and endorsed by (ISC)2 and one CPE credit will automatically be credited to your member account within four to six weeks.

Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). It is also suitable for compliance decision-makers, including: General Counsel, Chief Compliance or Privacy Officer; mid-level compliance/privacy management (Compliance Manager); and compliance/privacy practitioners (Compliance/Risk Assistant, Compliance Administrator). This event is not open to channel or technology partners.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organizations. It is also suitable for compliance decision-makers, including: General Counsel, Chief Compliance or Privacy Officer; mid-level compliance/privacy management (Compliance Manager); and compliance/privacy practitioners (Compliance/Risk Assistant, Compliance Administrator). This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are a $50 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.