Donec leo tortor, feugiat non molestie eget, semper eu quam. Suspendisse nec erat eu nunc porttitor volutpat nec molestie arcu. Nam pharetra id odio in hendrerit.
The event has already taken place, thanks for checking!
The event has already taken place, thanks for checking!
Email Authentication: Are You Ready for Stringent Email Acceptance Rules at Google, Apple, and Yahoo?
What if customers simply stopped getting your company’s emails? Organizations may face that scenario after three of the biggest email providers, Gmail, Apple, and Yahoo, announced new email authentication requirements, including DMARC.
Organizations that don’t comply could see their emails routed directly to customers’ spam folders or rejected altogether. Join our expert panel to learn what to do before the deadline—and how Proofpoint can help.
In this Power Series, our panel of experts will discuss:
After the event, we’ll be giving away a Pro-Series Drone* to the first 1,000 qualified attendees who place an order in the U.S. and Canada.
Nate Chessin is a 20 year technology and sales professional with extensive leadership and technical sales experience. Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures. Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE #12034.
Cheryl Tang leads product marketing for Core Email Security solutions at Proofpoint. She brings over 20 years of product marketing experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product marketing and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.
Ash Valeski joined Proofpoint as part of the Email Fraud Defense acquisition from Return Path. Valeski has spent his career in product management and business development working for Microsoft, Skype, and Tellme.
Kevin San Diego joined Proofpoint through the Cloudmark acquisition in 2017. Leading the product management team responsible for Email Fraud Defense, Secure Email Relay, Domain Discover, and Takedown products, Kevin has been an integral member of Proofpoint's Sender, Security, and Authentication team for the past two and a half years. He boasts extensive expertise encompassing email and mobile messaging, messaging security, DNS, email authentication, and various essential Internet, operations, and infrastructure technologies, dating back to the early 2000s. Actively engaged as a member and speaker at numerous security and standards conferences like M3AAWG, JPAAWG, CTIA, among others, Kevin remains dedicated to industry participation. He holds a bachelor’s degree in biology from the University of California, Santa Cruz, and more recently achieved a master’s degree in business administration from Dominican University of California.
More than 80% of cyberattacks—including ransomware and data exfiltration—rely on exploiting a privileged identity. Although organizations spent nearly $20 billion per year on identity and access management (IAM) tools in 2023 alone, attackers are still getting through. Why are existing security approaches not doing the job and stopping attackers in the middle of the attack chain? Our experts will explore the gaps between common security strategies and today’s highly successful attacks.
In this Power Series, our panel of experts will discuss:
After the event, we’ll be giving away a RC Dryfter Car* to the first 1,000 qualified attendees who claim their gift in the U.S. and Canada.
Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.
Ofer Israeli is the Group Vice President and General Manager of Proofpoint’s Identity Threat Defense business. In this role, Ofer drives both strategy and technology development to help the world’s leading multinational organizations detect active attacks within their environments and manage their identity risk. With more than 15 years of cybersecurity and IT leadership experience, Ofer joined Proofpoint through the acquisition of Illusive, a leader and pioneer in Identity Threat Detection and Response (ITDR), which Ofer founded and led as its CEO. Previous to founding Illusive, Ofer managed development teams around the globe for Check Point Software Technologies and worked in the Atom Chip Lab at Ben-Gurion University, where he focused on theoretical quantum mechanics. Ofer holds B.Sc. degrees in Computer Science and Physics from Ben-Gurion University of the Negev in Israel.
Nir is our resident technical expert, making sure customer needs are understood and met across a wide variety of industry verticals and use cases. Previously, he spent seven years with Check Point where he led the International Endpoint Support Group. He also served as Communication Training Center Deputy Commander and Trainers’ Leader in the Hoshen unit of the Israel Defense Forces, which manages inter-unit communications for the IDF. He graduated from Rehovot’s ORT College as an Electronic and Computer Practical Engineer, and studied social science and management at the Open University.
Jasmine Wu is the Senior Director of Product Marketing and Head of GTM Operations at Proofpoint. She has over 15+ years of experience providing thought leadership and advisory in the emerging technologies space, including cloud collaboration, corporate risk protection, information governance, and digital transformation.
Ryan Bachman serves as Executive Vice President and Global Chief Information Security Officer at General Motors Financial. Reporting directly to the CEO and quarterly to the Board of Directors, Ryan has responsibility for Global Cybersecurity, Enterprise Resiliency, Operational Sustainability, Global Real Estate, Personnel Security, Safety, and Investigations for General Motors Financial. Ryan leads global teams of cybersecurity, technology, and operations professionals responsible for managing cybersecurity risk, operations risk, and compliance risk. Prior to joining GM Financial, Ryan spent more than 12 years serving Fortune 500 companies across numerous industries as a management consultant at PwC and Deloitte, specializing in technology integration, cybersecurity, and operations management. In addition, Ryan spent 2 years at an online broker dealer and bank startup. Ryan began his career as a software developer with AT&T. Ryan earned his Bachelor of Science in Business Administration, with a major in Management Information Systems, from Saint Louis University, and his Master of Business Administration from Massachusetts Institute of Technology.
They’re not a new problem, but misdirected emails are the leading cause of both compliance violations for GDPR and HIPAA and accidental data loss. Are you worried about a physician sending the wrong health record to a patient? Or HR exposing confidential data via email to a wrong but similar-looking contact name? According to Ponemon research, 65% of all data loss incidents occurred via email in 2022. Nearly two-thirds of organizations experienced data loss or exfiltration due to an employee mistake on email. Security teams take 48 hours, on average, to detect and remediate a data loss incident caused by employee carelessness.
Join this Power Series as our panel of experts discuss:
After the event, we’ll be giving away an Atari Pocket Arcade* to the first 1,000 qualified attendees who claim their gift in the U.S. and Canada.
With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.
As EVP and GM, Darren Lee is responsible for the Proofpoint Security Products and Services Group. As GM, Darren is responsible for the Proofpoint core security offerings for Threat, Email Security, Identity Defense, Threat Research and Machine Learning. Prior to this role, Darren led the company’s Compliance and Digital Risk group, the financial services segment, and machine learning investments. Before joining Proofpoint, Darren served as the Founder and CEO of NextPage, a leading provider of Information Governance solutions. Having founded multiple startup companies, he has vast experience in defining markets, creating products, executing acquisitions, and driving revenue to build viable businesses. Darren holds a B.S. in Electrical and Computer Engineering from BYU.
Ed is the co-founder of Tessian, an email security company recently acquired by Proofpoint. At Tessian, Ed was the CTO for 11 years and pioneered the approach of combining behavioural modelling with machine learning to detect advanced threats on email like accidental data loss and business email compromise attacks. Ed has Masters degrees in Mechanical Engineering from Imperial College London and Applicable Mathematics from the London School of Economics.
Henry joined Tessian 7 years ago, and has been leading the customer-org since (sales engineering, customer programs, technical operations, onboarding and customer success management). Prior to Tessian, Henry was a lawyer focusing on intellectual property and data protection.
This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.
This event is suitable for information security decision-makers, including CXOs, VP of IT, Director of IT, as well as mid-level information security management professionals (Senior Security Manager, IT Security Manager, IT Manager), and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). It is also relevant for Proofpoint Channel Partner representatives.
NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
*Offer subject to availability. These gifts are a $25 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.
**Qualified attendees include information security decision-makers: CXOs, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organizations, as well as Proofpoint Channel Partner representatives within the US and Canada. This gift is not available to independent consultants or technology partners.