• Days
  • Hours
  • Minutes
  • Seconds

The event has already taken place, thanks for checking!

CISO Perspectives on Cyber Insurance


Cybersecurity insurers are responding to the exponential increases in ransomware and other cyber threats by increasing premiums and security control requirements. This leaves many organizations struggling to understand the evolving cybersecurity insurance market. But one thing remains clear – cybersecurity insurance does not replace the need for cybersecurity solutions, and it cannot protect organizations from ransomware, phishing, malware, or insider threats.

Join this Power Series as we discuss:

  • Cyber insurers’ increasing cybersecurity requirements and premiums
  • Coverage requirements, gaps, and increasing costs
  • Top reasons insurers decline coverage

Justifying and Building an ITM Program


Most security leaders know insider threats are a serious and evolving cybersecurity risk. But explaining these risks to other executives to get the buy-in to build an insider threat management (ITM) program and make investments that count is an area where many still struggle.

According to Ponemon, the number of insider threat incidents increased by 44% in the past two years, and the annual cost of those incidents increased by 34% from $11.45 million to $15.38 million.

Still think insider threat risks are an area that doesn’t require proactive attention?

Join this Power Series as we discuss:

  • How insider threats have evolved in an era of distributed work, and the financial consequences
  • The three main obstacles to funding an ITM program
  • How to build an ITM program tailored to business outcomes
  • How to ensure ITM is a C-level imperative

Behind the Scenes with Threat Research


As the term "cyber threat" becomes part of our everyday language, and cyber-attacks are reported weekly (almost daily!), have you ever wondered who is behind-the-scenes tracking the adversaries responsible for some of the biggest security incidents in history? We are.

The Threat Research team at Proofpoint is comprised of experts on topics that include credential theft, BEC, crimeware, APT, and more! Their research drives detections and intelligence as seen in Proofpoint TAP and other solutions, and influences people, processes, and technology to stay ahead of the threats that target people and organizations every day.

Join this Power Series as we discuss:

  • How to think like a threat actor
  • A day in the life of a Threat Researcher
  • Where does the research go?


Update: We’ll be covering the evolving threat landscape related to the Ukraine and Russia conflict. Proofpoint continues to monitor these threats and release findings continuously for the benefit of defenders globally.


Get Your Power Series Gift!

As a thank you, we’re offering our security community a complimentary gift for joining us. Each qualified attendee* will have the option to order their own Power Series Gift** after the event, selecting from a Hydro Flask, Skullcandy Riff Wireless On-Ear Headphones, or a Herschel Classic Backpack.

*If you cannot accept or wish not to accept the Power Series Gift, please make sure to decline upon registering. Power Series Gifts are only available to qualified attendees in the U.S. or Canada.

The New Normal of Email Security


While ransomware is a hot topic in cybersecurity right now, protecting your entire organization goes far beyond detecting and stopping just one type of attack. What other methods might threat actors use to attack you? Who poses the greatest risk to your organization? Where might threat actors attempt to infiltrate your organization outside of a standard email attack?

Join Proofpoint email security experts and former Gartner security analysts to discuss emerging trends in both attacks and protection. Learn how security teams are adopting and integrating new use cases into email security to create holistic views of threat landscapes.

In this Power Series, we will discuss:

  • Newly emerging email threats and tactics
  • Email security as a platform, not just a gateway
  • Additional use cases being integrated into email security



Rutrun Vehicula Fermentum Lacinia Enim

FEATURED HOST

Dave Cook
Dave Cook | Sr. Product Marketing Manager, Proofpoint, Inc.

Dave Cook is a Sr. Product Marketing Manager at Proofpoint, where he is primarily focused on Email Security Products, Technology Partners, and Actionable Insights. Dave spent several years in the Web Analytics space before making the move to Business Intelligence and then Cybersecurity. As a product marketer, his core focus has been on gaining meaningful insights from data using Machine Learning and Data Science. He brings this experience into the world of cybersecurity, using Proofpoint’s unparalleled data, models, and reporting capabilities to help cybersecurity professionals better understand how to best protect their organizations.

FEATURED PANELISTS

Brian Reed
Brian Reed | Director of Cybersecurity Strategy, Proofpoint, Inc.

Brian Reed is our Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.


Mark Harris
Mark Harris | Cybersecurity Advisor, Proofpoint, Inc.

Mark Harris is a Cybersecurity Advisor at Proofpoint. As a Former Sr Director Analyst at Gartner, he covered a number of security topics, including email security, and was the lead author on the Market Guide for Email Security. Harris authored numerous research notes as well as Magic Quadrant, Critical Capabilities, Hype Cycle and Cool Vendor reports. Prior to Gartner, he spent over 20 years in a variety of Software engineering roles at both McAfee and Sophos, including 8 years running the threat research labs at Sophos. He has over a dozen patents around cyber security and is an experienced speaker that has presented at many conferences, including RSA, InfoSec, Hacker Halted as well as TV and Radio interviews.

Modern Compliance Matters


On the fourth anniversary of the enforcement of the Global Data Protection Regulation (GDPR), we look at how the accelerated journey of digital privacy compliance, a combination of digital information privacy and regulatory compliance, has evolved from simple opt-out forms to critical corporate strategy. Regardless of where your organization is located, keeping data forever no longer aligns with long-term information retention requirements, given stringent regulations. Today, you must successfully prove your firm’s ability to safeguard personal data or face the consequences of non-compliance penalties and fines and other business risks.

Join this Power Series to hear from privacy and compliance experts as we discuss:

  • Key privacy challenges and trends faced by modern enterprises
  • Where security and compliance intersect to address privacy requirements
  • Best practices to achieve elements of digital privacy compliance





Rutrun Vehicula Fermentum Lacinia Enim

FEATURED HOST

John Pepe
John Pepe | Resident Chief Compliance and Regulatory Officer, Proofpoint, Inc.

John Pepe is Proofpoint's Resident Chief Compliance and Regulatory Officer at Proofpoint Archiving and Compliance where he helps customers solve legal, compliance and regulatory challenges using industry best practices and the latest analytics tools. John holds a Law Degree with a concentration in Corporate and Securities Law from Rutgers Law School and holds FINRA Series 7, 24, and 4 Principal registrations. Prior to joining Proofpoint, John was a financial services compliance officer and is still very active as an industry advisor to asset managers, banks, and brokerages.

FEATURED PANELIST

Lucia Milică
Lucia Milică | VP, Global Resident CISO, Proofpoint, Inc.

Lucia Milică Stacy serves as VP, Global Resident Chief Information Security Officer at Proofpoint, a leading cybersecurity and compliance company. She is a senior technology leader with over 20 years of extensive technical and business experience. In her previous role, Lucia was the VP, Chief Information Security Officer & Chief Privacy Officer for Polycom, where she managed all aspects of data privacy and information security. She has also held leadership and technical roles in IT governance & strategy, security risk and compliance, corporate and product security, data privacy, and IT infrastructure at other companies, including HP, Palm, Wells Fargo, and Franklin Templeton. Many organizations in the cybersecurity industry and broader business community have asked her to speak at their conferences, symposiums, and other events. She has also extended her contributions to her profession by serving as an advisory board member and active participant with the cybersecurity industry and relevant industry groups, including board membership on the National Technology Security Coalition, and service with the Department of Health and Human Services (HHS) 405(d) Cybersecurity Task Group, SC Media Advisory Board, and Forbes Technology Council. She has a Master of Science in Information and Cybersecurity degree from the University of California, Berkeley. She also holds Master in Business Administration and Juris Doctorate degrees.


Michael McGrath
Dr. Michael McGrath | Sr. Director, Compliance & Archiving and Digital Risk, Proofpoint, Inc.

Michael leads Proofpoint's Compliance, Archiving and Digital Risk management function for EMEA. He supports customers, regulators, and technology experts to apply advanced technology to meet Enterprise's needs to better compliance, information, and cost management. He's an experienced and award-winning leader, author and researcher. He started his career at IBM Research and has worked in financial services for the last 25 years. Today he is senior director for Compliance, Archiving and Digital Risk at Proofpoint, one of the world's leading RegTech and CyberTech firms. He also leads the Seahorse Data Research Programme, an open-source community research project into the nature of data and data interoperability. He studied Computer Science at the Waterford Institute of Technology, and was awarded his master’s from the Smurfit Business School and his doctorate from Cranfield University. He also won the gold medal for research from the Institute of Chartered Accountants for his research into applying Neural Networks to investment decisions making. He has published two books on Merger and Acquisition management and one on Photography, a life-long passion. He lives near London with his wife and children.


Kevin Novak
Kevin Novak | Managing Director, Cybersecurity, Breakwater Solutions

Kevin Novak is a Managing Director based in Chicago, IL. Mr. Novak is responsible for the growth and delivery strategy of the Cybersecurity practice. Mr. Novak has deep expertise in technology security, information security, technology risk management, and fraud and forensics. Prior to Breakwater, Mr. Novak was the chief information security officer of Northern Trust Corporation. Mr. Novak has a BS in Accounting from Western Michigan University’s Haworth College of Business. Mr. Novak is a Certified Information Security Manager (CISM) and a Certified Data Privacy Solutions Engineer (CDPSE).

Celebrating 20 Years of Cybersecurity


Over the past two decades, the cybersecurity threat landscape has changed at warp speed. From worms to ransomware, script kiddies to cyber gangs, tactics have evolved and lessons have been learned. In our 20 years, Proofpoint has gained the deep understanding and hard-won insight that only comes from being on the front lines of cyber defense.

Join Proofpoint CEO Ashan Willy and our leadership team as we celebrate 20 years of Proofpoint and share wisdom and insights from our journey.

In this Power Series, we will discuss:

  • The evolution from the ILOVEYOU virus to WannaCry to imposter attacks and ransomware — and what’s next
  • Insights from the biggest data breaches over the past 20 years
  • The importance of a people-centric approach to security and compliance to stop cyber threats and mitigate risks
  • Our vision for the future of Proofpoint

Power Series Gift

As a thank you for joining us on June 15th to celebrate our 20th anniversary, we’re offering our security community the option to order a special complimentary gift pack after the event. Each qualified attendee will get a Roots Hoodie** to get their swagger on and a 30oz Yeti Travel Mug** to toast to another 20 years of Proofpoint!



Rutrun Vehicula Fermentum Lacinia Enim

EXECUTIVE HOST

Ashan Willy
Ashan Willy | Chief Executive Officer, Proofpoint, Inc.

Ashan Willy is the Chief Executive Officer at Proofpoint. In his previous role, he led Product Management, Engineering and Threat Research for the Proofpoint Security Products and Services Group. Mr. Willy brings more than 25 years of leadership experience in engineering, product management, worldwide strategy and planning in global markets to his role. Before that, he led Global Systems Engineering, Customer Success and Renewals for Proofpoint. Prior to Proofpoint, he led teams at Webex, Juniper, Polycom and Cisco. Mr. Willy holds a Master of Business Administration degree from Pepperdine University in California and a Bachelor of Science in Electrical Engineering from McMaster University in Ontario, Canada. He also holds a CCIE, among other industry designations.

EXECUTIVE PANELISTS

Ryan Kalember
Ryan Kalember | EVP, Cybersecurity Strategy, Proofpoint, Inc.

With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.



Nate Chessin
Nate Chessin | SVP, Worldwide Systems Engineering, Proofpoint, Inc.

Nate Chessin is the SVP of Worldwide Systems Engineering at Proofpoint. He is a 20 year technology and sales professional with extensive leadership and technical sales experience. Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures. Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE #12034.



Sherrod DeGrippo
Sherrod DeGrippo | VP, Threat Research and Detection, Proofpoint, Inc.

Sherrod DeGrippo is the VP, Threat Research and Detection for Proofpoint. She leads a worldwide malware research team to advance Proofpoint threat intelligence and keep organizations safe from cyberattacks. With more than 15 years of information security experience, DeGrippo successfully directs her 24/7 team to investigate advanced threats, release multiple daily security updates and create scalable threat intelligence solutions that integrate directly into Proofpoint products. Prior to Proofpoint, she led Nexum’s information security professional services practice for penetration testing, web application assessment, risk assessment and security consulting. Before Nexum, DeGrippo served as a senior solutions engineer for Symantec and was responsible for managed security solutions. Along with these positions, she has created internal services offerings for top secret government facilities and is a former Georgia Tech Linux Users Group officer. A frequent incident response and forensics speaker across user groups, DeGrippo holds numerous certifications including SANS GCFA - GIAC Certified Forensics Analyst, SANS GCIH - GIAC Certified Incident Handler, and NSA INFOSEC Assessment Methodology (NSA-IAM).


(ISC)2 CPE Logo

Earn Cybersecurity CPE Credits - ISC2

This event is approved and endorsed by (ISC)2 and one CPE credit will automatically be credited to your member account within four to six weeks.

Who Should Attend

This event is suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Terms and Conditions

*Qualified attendees include information security decision makers: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organizations. This gift is not available to independent consultants or channel or technology partners.

**Offer subject to availability. These gifts are a $50 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.