• Days
  • Hours
  • Minutes
  • Seconds

The event has already taken place, thanks for checking!

Aired on Wednesday, January 24, 2024
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

Prepare for the E-pocalypse


Email Authentication: Are You Ready for Stringent Email Acceptance Rules at Google, Apple, and Yahoo?


What if customers simply stopped getting your company’s emails? Organizations may face that scenario after three of the biggest email providers, Gmail, Apple, and Yahoo, announced new email authentication requirements, including DMARC.

Organizations that don’t comply could see their emails routed directly to customers’ spam folders or rejected altogether. Join our expert panel to learn what to do before the deadline—and how Proofpoint can help.

In this Power Series, our panel of experts will discuss:

  • Why Yahoo, Apple, and Google are mandating email authentication
  • How email authentication and DMARC work
  • The benefits and challenges of meeting the new requirements


Get Your Power Series Gift!

After the event, we’ll be giving away a Pro-Series Drone* to the first 1,000 qualified attendees who place an order in the U.S. and Canada.





Rutrun Vehicula Fermentum Lacinia Enim

Host

Nate Chessin
Nate Chessin | SVP, Worldwide Sales Engineering, Proofpoint, Inc.

Nate Chessin is a 20 year technology and sales professional with extensive leadership and technical sales experience. Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures. Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE #12034.


Featured Panelists

Cheryl Tang
Cheryl Tang | Sr. Director, Product Marketing, Proofpoint, Inc.

Cheryl Tang leads product marketing for Core Email Security solutions at Proofpoint. She brings over 20 years of product marketing experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product marketing and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.


Ash Valeski
Ash Valeski | Senior SER Solutions Director, Proofpoint, Inc.

Ash Valeski joined Proofpoint as part of the Email Fraud Defense acquisition from Return Path. Valeski has spent his career in product management and business development working for Microsoft, Skype, and Tellme.


Kevin San Diego
Kevin San Diego | Sr. Director, Product Management - Sender, Security and Authentication, Proofpoint, Inc.

Kevin San Diego joined Proofpoint through the Cloudmark acquisition in 2017. Leading the product management team responsible for Email Fraud Defense, Secure Email Relay, Domain Discover, and Takedown products, Kevin has been an integral member of Proofpoint's Sender, Security, and Authentication team for the past two and a half years. He boasts extensive expertise encompassing email and mobile messaging, messaging security, DNS, email authentication, and various essential Internet, operations, and infrastructure technologies, dating back to the early 2000s. Actively engaged as a member and speaker at numerous security and standards conferences like M3AAWG, JPAAWG, CTIA, among others, Kevin remains dedicated to industry participation. He holds a bachelor’s degree in biology from the University of California, Santa Cruz, and more recently achieved a master’s degree in business administration from Dominican University of California.




Aired on Wednesday, February 14, 2024
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

Identity Security Gaps and Threats


More than 80% of cyberattacks—including ransomware and data exfiltration—rely on exploiting a privileged identity. Although organizations spent nearly $20 billion per year on identity and access management (IAM) tools in 2023 alone, attackers are still getting through. Why are existing security approaches not doing the job and stopping attackers in the middle of the attack chain? Our experts will explore the gaps between common security strategies and today’s highly successful attacks.

In this Power Series, our panel of experts will discuss:

  • Why modern attacks center around using privileged identities
  • How to make sense of PAM, XDR, EDR and ITDR
  • Where identity threat detection and response can fill the gaps

Get Your Power Series Gift!

After the event, we’ll be giving away a RC Dryfter Car* to the first 1,000 qualified attendees who claim their gift in the U.S. and Canada.



Rutrun Vehicula Fermentum Lacinia Enim

Host

Brian Reed
Brian Reed | Sr. Director, Cybersecurity Strategy, Proofpoint, Inc

Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.

Featured Panelists

Nir Greenberg
Ofer Israeli | Group Vice President & General Manager, Identity Threat Defense, Proofpoint, Inc. 

Ofer Israeli is the Group Vice President and General Manager of Proofpoint’s Identity Threat Defense business. In this role, Ofer drives both strategy and technology development to help the world’s leading multinational organizations detect active attacks within their environments and manage their identity risk. With more than 15 years of cybersecurity and IT leadership experience, Ofer joined Proofpoint through the acquisition of Illusive, a leader and pioneer in Identity Threat Detection and Response (ITDR), which Ofer founded and led as its CEO. Previous to founding Illusive, Ofer managed development teams around the globe for Check Point Software Technologies and worked in the Atom Chip Lab at Ben-Gurion University, where he focused on theoretical quantum mechanics. Ofer holds B.Sc. degrees in Computer Science and Physics from Ben-Gurion University of the Negev in Israel.


Kevin San Diego
Nir Greenberg | Senior Director, Sales Engineering, Proofpoint, Inc.

Nir is our resident technical expert, making sure customer needs are understood and met across a wide variety of industry verticals and use cases. Previously, he spent seven years with Check Point where he led the International Endpoint Support Group. He also served as Communication Training Center Deputy Commander and Trainers’ Leader in the Hoshen unit of the Israel Defense Forces, which manages inter-unit communications for the IDF. He graduated from Rehovot’s ORT College as an Electronic and Computer Practical Engineer, and studied social science and management at the Open University.


Jasmine Wu
Jasmine Wu | Senior Director, Product Marketing & Head of GTM Operations, Proofpoint, Inc.

Jasmine Wu is the Senior Director of Product Marketing and Head of GTM Operations at Proofpoint. She has over 15+ years of experience providing thought leadership and advisory in the emerging technologies space, including cloud collaboration, corporate risk protection, information governance, and digital transformation.


Ryan Bachman
Ryan Bachman | Executive Vice President & Global Chief Information Security Officer, General Motors Financial

Ryan Bachman serves as Executive Vice President and Global Chief Information Security Officer at General Motors Financial.  Reporting directly to the CEO and quarterly to the Board of Directors, Ryan has responsibility for Global Cybersecurity, Enterprise Resiliency, Operational Sustainability, Global Real Estate, Personnel Security, Safety, and Investigations for General Motors Financial. Ryan leads global teams of cybersecurity, technology, and operations professionals responsible for managing cybersecurity risk, operations risk, and compliance risk. Prior to joining GM Financial, Ryan spent more than 12 years serving Fortune 500 companies across numerous industries as a management consultant at PwC and Deloitte, specializing in technology integration, cybersecurity, and operations management. In addition, Ryan spent 2 years at an online broker dealer and bank startup. Ryan began his career as a software developer with AT&T. Ryan earned his Bachelor of Science in Business Administration, with a major in Management Information Systems, from Saint Louis University, and his Master of Business Administration from Massachusetts Institute of Technology.


Aired on Wednesday, March 13, 2024
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

Protecting the #1 Data Loss Vector


They’re not a new problem, but misdirected emails are the leading cause of both compliance violations for GDPR and HIPAA and accidental data loss. Are you worried about a physician sending the wrong health record to a patient? Or HR exposing confidential data via email to a wrong but similar-looking contact name? According to Ponemon research, 65% of all data loss incidents occurred via email in 2022. Nearly two-thirds of organizations experienced data loss or exfiltration due to an employee mistake on email. Security teams take 48 hours, on average, to detect and remediate a data loss incident caused by employee carelessness.

Join this Power Series as our panel of experts discuss:

  • How and why simple mistakes in email have become the #1 cause of fines and other serious consequences due to data loss
  • Why new AI- and behavior-based approaches can augment Microsoft and Google’s native capabilities to finally solve this problem
  • How you can help all your users become defenders of your organization’s data, lowering the burden on your analysts and reducing risk


Get Your Power Series Gift!

After the event, we’ll be giving away an Atari Pocket Arcade* to the first 1,000 qualified attendees who claim their gift in the U.S. and Canada.





Rutrun Vehicula Fermentum Lacinia Enim

Host

Ryan Kalember
Ryan Kalember | Chief Strategy Officer, Proofpoint, Inc.

With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

Featured Panelists

Darren Lee
Darren Lee | EVP & GM, PPG, Proofpoint, Inc.

As EVP and GM, Darren Lee is responsible for the Proofpoint Security Products and Services Group. As GM, Darren is responsible for the Proofpoint core security offerings for Threat, Email Security, Identity Defense, Threat Research and Machine Learning. Prior to this role, Darren led the company’s Compliance and Digital Risk group, the financial services segment, and machine learning investments. Before joining Proofpoint, Darren served as the Founder and CEO of NextPage, a leading provider of Information Governance solutions. Having founded multiple startup companies, he has vast experience in defining markets, creating products, executing acquisitions, and driving revenue to build viable businesses. Darren holds a B.S. in Electrical and Computer Engineering from BYU.


Ed Bishop
Ed Bishop | GVP, R&D, Tessian Group (PPG), Proofpoint, Inc.

Ed is the co-founder of Tessian, an email security company recently acquired by Proofpoint. At Tessian, Ed was the CTO for 11 years and pioneered the approach of combining behavioural modelling with machine learning to detect advanced threats on email like accidental data loss and business email compromise attacks. Ed has Masters degrees in Mechanical Engineering from Imperial College London and Applicable Mathematics from the London School of Economics.



Henry Thomas
Henry Thomas | Sr. Director, CS - Tessian Group, Proofpoint, Inc.

Henry joined Tessian 7 years ago, and has been leading the customer-org since (sales engineering, customer programs, technical operations, onboarding and customer success management). Prior to Tessian, Henry was a lawyer focusing on intellectual property and data protection.


(ISC)2 CPE Logo

Earn Cybersecurity CPE Credits - ISC2

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.

Who Should Attend

This event is suitable for information security decision-makers, including CXOs, VP of IT, Director of IT, as well as mid-level information security management professionals (Senior Security Manager, IT Security Manager, IT Manager), and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). It is also relevant for Proofpoint Channel Partner representatives.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.



Terms and Conditions

*Offer subject to availability. These gifts are a $25 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.

**Qualified attendees include information security decision-makers: CXOs, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organizations, as well as Proofpoint Channel Partner representatives within the US and Canada. This gift is not available to independent consultants or technology partners.