Donec leo tortor, feugiat non molestie eget, semper eu quam. Suspendisse nec erat eu nunc porttitor volutpat nec molestie arcu. Nam pharetra id odio in hendrerit.
The event has already taken place, thanks for checking!
The event has already taken place, thanks for checking!
Cybersecurity insurers are responding to the exponential increases in ransomware and other cyber threats by increasing premiums and security control requirements. This leaves many organizations struggling to understand the evolving cybersecurity insurance market. But one thing remains clear – cybersecurity insurance does not replace the need for cybersecurity solutions, and it cannot protect organizations from ransomware, phishing, malware, or insider threats.
Join this Power Series as we discuss:
Most security leaders know insider threats are a serious and evolving cybersecurity risk. But explaining these risks to other executives to get the buy-in to build an insider threat management (ITM) program and make investments that count is an area where many still struggle.
According to Ponemon, the number of insider threat incidents increased by 44% in the past two years, and the annual cost of those incidents increased by 34% from $11.45 million to $15.38 million.
Still think insider threat risks are an area that doesn’t require proactive attention?
Join this Power Series as we discuss:
As the term "cyber threat" becomes part of our everyday language, and cyber-attacks are reported weekly (almost daily!), have you ever wondered who is behind-the-scenes tracking the adversaries responsible for some of the biggest security incidents in history? We are.
The Threat Research team at Proofpoint is comprised of experts on topics that include credential theft, BEC, crimeware, APT, and more! Their research drives detections and intelligence as seen in Proofpoint TAP and other solutions, and influences people, processes, and technology to stay ahead of the threats that target people and organizations every day.
Join this Power Series as we discuss:
Update: We’ll be covering the evolving threat landscape related to the Ukraine and Russia conflict. Proofpoint continues to monitor these threats and release findings continuously for the benefit of defenders globally.
As a thank you, we’re offering our security community a complimentary gift for joining us. Each qualified attendee* will have the option to order their own Power Series Gift** after the event, selecting from a Hydro Flask, Skullcandy Riff Wireless On-Ear Headphones, or a Herschel Classic Backpack.
*If you cannot accept or wish not to accept the Power Series Gift, please make sure to decline upon registering. Power Series Gifts are only available to qualified attendees in the U.S. or Canada.
While ransomware is a hot topic in cybersecurity right now, protecting your entire organization goes far beyond detecting and stopping just one type of attack. What other methods might threat actors use to attack you? Who poses the greatest risk to your organization? Where might threat actors attempt to infiltrate your organization outside of a standard email attack?
Join Proofpoint email security experts and former Gartner security analysts to discuss emerging trends in both attacks and protection. Learn how security teams are adopting and integrating new use cases into email security to create holistic views of threat landscapes.
In this Power Series, we will discuss:
Dave Cook is a Sr. Product Marketing Manager at Proofpoint, where he is primarily focused on Email Security Products, Technology Partners, and Actionable Insights. Dave spent several years in the Web Analytics space before making the move to Business Intelligence and then Cybersecurity. As a product marketer, his core focus has been on gaining meaningful insights from data using Machine Learning and Data Science. He brings this experience into the world of cybersecurity, using Proofpoint’s unparalleled data, models, and reporting capabilities to help cybersecurity professionals better understand how to best protect their organizations.
Brian Reed is our Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.
Mark Harris is a Cybersecurity Advisor at Proofpoint. As a Former Sr Director Analyst at Gartner, he covered a number of security topics, including email security, and was the lead author on the Market Guide for Email Security. Harris authored numerous research notes as well as Magic Quadrant, Critical Capabilities, Hype Cycle and Cool Vendor reports. Prior to Gartner, he spent over 20 years in a variety of Software engineering roles at both McAfee and Sophos, including 8 years running the threat research labs at Sophos. He has over a dozen patents around cyber security and is an experienced speaker that has presented at many conferences, including RSA, InfoSec, Hacker Halted as well as TV and Radio interviews.
On the fourth anniversary of the enforcement of the Global Data Protection Regulation (GDPR), we look at how the accelerated journey of digital privacy compliance, a combination of digital information privacy and regulatory compliance, has evolved from simple opt-out forms to critical corporate strategy. Regardless of where your organization is located, keeping data forever no longer aligns with long-term information retention requirements, given stringent regulations. Today, you must successfully prove your firm’s ability to safeguard personal data or face the consequences of non-compliance penalties and fines and other business risks.
Join this Power Series to hear from privacy and compliance experts as we discuss:
John Pepe is Proofpoint's Resident Chief Compliance and Regulatory Officer at Proofpoint Archiving and Compliance where he helps customers solve legal, compliance and regulatory challenges using industry best practices and the latest analytics tools. John holds a Law Degree with a concentration in Corporate and Securities Law from Rutgers Law School and holds FINRA Series 7, 24, and 4 Principal registrations. Prior to joining Proofpoint, John was a financial services compliance officer and is still very active as an industry advisor to asset managers, banks, and brokerages.
Lucia Milică Stacy serves as VP, Global Resident Chief Information Security Officer at Proofpoint, a leading cybersecurity and compliance company. She is a senior technology leader with over 20 years of extensive technical and business experience. In her previous role, Lucia was the VP, Chief Information Security Officer & Chief Privacy Officer for Polycom, where she managed all aspects of data privacy and information security. She has also held leadership and technical roles in IT governance & strategy, security risk and compliance, corporate and product security, data privacy, and IT infrastructure at other companies, including HP, Palm, Wells Fargo, and Franklin Templeton. Many organizations in the cybersecurity industry and broader business community have asked her to speak at their conferences, symposiums, and other events. She has also extended her contributions to her profession by serving as an advisory board member and active participant with the cybersecurity industry and relevant industry groups, including board membership on the National Technology Security Coalition, and service with the Department of Health and Human Services (HHS) 405(d) Cybersecurity Task Group, SC Media Advisory Board, and Forbes Technology Council. She has a Master of Science in Information and Cybersecurity degree from the University of California, Berkeley. She also holds Master in Business Administration and Juris Doctorate degrees.
Michael leads Proofpoint's Compliance, Archiving and Digital Risk management function for EMEA. He supports customers, regulators, and technology experts to apply advanced technology to meet Enterprise's needs to better compliance, information, and cost management. He's an experienced and award-winning leader, author and researcher. He started his career at IBM Research and has worked in financial services for the last 25 years. Today he is senior director for Compliance, Archiving and Digital Risk at Proofpoint, one of the world's leading RegTech and CyberTech firms. He also leads the Seahorse Data Research Programme, an open-source community research project into the nature of data and data interoperability. He studied Computer Science at the Waterford Institute of Technology, and was awarded his master’s from the Smurfit Business School and his doctorate from Cranfield University. He also won the gold medal for research from the Institute of Chartered Accountants for his research into applying Neural Networks to investment decisions making. He has published two books on Merger and Acquisition management and one on Photography, a life-long passion. He lives near London with his wife and children.
Kevin Novak is a Managing Director based in Chicago, IL. Mr. Novak is responsible for the growth and delivery strategy of the Cybersecurity practice. Mr. Novak has deep expertise in technology security, information security, technology risk management, and fraud and forensics. Prior to Breakwater, Mr. Novak was the chief information security officer of Northern Trust Corporation. Mr. Novak has a BS in Accounting from Western Michigan University’s Haworth College of Business. Mr. Novak is a Certified Information Security Manager (CISM) and a Certified Data Privacy Solutions Engineer (CDPSE).
Over the past two decades, the cybersecurity threat landscape has changed at warp speed. From worms to ransomware, script kiddies to cyber gangs, tactics have evolved and lessons have been learned. In our 20 years, Proofpoint has gained the deep understanding and hard-won insight that only comes from being on the front lines of cyber defense.
Join Proofpoint CEO Ashan Willy and our leadership team as we celebrate 20 years of Proofpoint and share wisdom and insights from our journey.
In this Power Series, we will discuss:
As a thank you for joining us on June 15th to celebrate our 20th anniversary, we’re offering our security community the option to order a special complimentary gift pack after the event. Each qualified attendee will get a Roots Hoodie** to get their swagger on and a 30oz Yeti Travel Mug** to toast to another 20 years of Proofpoint!
Ashan Willy is the Chief Executive Officer at Proofpoint. In his previous role, he led Product Management, Engineering and Threat Research for the Proofpoint Security Products and Services Group. Mr. Willy brings more than 25 years of leadership experience in engineering, product management, worldwide strategy and planning in global markets to his role. Before that, he led Global Systems Engineering, Customer Success and Renewals for Proofpoint. Prior to Proofpoint, he led teams at Webex, Juniper, Polycom and Cisco. Mr. Willy holds a Master of Business Administration degree from Pepperdine University in California and a Bachelor of Science in Electrical Engineering from McMaster University in Ontario, Canada. He also holds a CCIE, among other industry designations.
With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
Nate Chessin is the SVP of Worldwide Systems Engineering at Proofpoint. He is a 20 year technology and sales professional with extensive leadership and technical sales experience. Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures. Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE #12034.
Sherrod DeGrippo is the VP, Threat Research and Detection for Proofpoint. She leads a worldwide malware research team to advance Proofpoint threat intelligence and keep organizations safe from cyberattacks. With more than 15 years of information security experience, DeGrippo successfully directs her 24/7 team to investigate advanced threats, release multiple daily security updates and create scalable threat intelligence solutions that integrate directly into Proofpoint products. Prior to Proofpoint, she led Nexum’s information security professional services practice for penetration testing, web application assessment, risk assessment and security consulting. Before Nexum, DeGrippo served as a senior solutions engineer for Symantec and was responsible for managed security solutions. Along with these positions, she has created internal services offerings for top secret government facilities and is a former Georgia Tech Linux Users Group officer. A frequent incident response and forensics speaker across user groups, DeGrippo holds numerous certifications including SANS GCFA - GIAC Certified Forensics Analyst, SANS GCIH - GIAC Certified Incident Handler, and NSA INFOSEC Assessment Methodology (NSA-IAM).
This event is approved and endorsed by (ISC)2 and one CPE credit will automatically be credited to your member account within four to six weeks.
This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.
NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organizations. This gift is not available to independent consultants or channel or technology partners.
**Offer subject to availability. These gifts are a $50 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.