• Days
  • Hours
  • Minutes
  • Seconds

The event has already taken place, thanks for checking!

Zoom | Mercredi 24 avril 2024
10-11 HNP | 12-13 HNC | 13-14 HNE (continent américain)

Dans les coulisses avec Threat Research


L'une des questions les plus courantes que nous recevons est la suivante : "À quoi ressemble une journée dans la vie d'un chercheur en cybermenaces ?" Voici votre chance de le découvrir directement auprès de l'équipe qui fait face aux acteurs des menaces tous les jours. Découvrez comment nos chercheurs découvrent et perturbent les cyberattaques, analysent les auteurs de menaces et les campagnes, tout en fournissant des renseignements de pointe sur les menaces pour une sécurité centrée sur l'humain protégeant les clients et la communauté de cybersécurité.

L'équipe de Proofpoint Threat Research (recherches sur les menaces de Proofpoint) est composée d’experts de l'industrie qui couvre tout dans le paysage des menaces : du BEC aux kits de phishing (hameçonnage) MFA, en passant par les nouveaux chargeurs de logiciels malveillants et le phishing par QR-code .

Rejoignez cette Power Series où notre panel d'experts discutera:

  • Des menaces qui nous empêchent de dormir la nuit
  • Des parcours professionnels vers la cybersécurité
  • Que fait Proofpoint avec notre recherche ?
  • Surprises du paysage des menaces


Obtenez votre cadeau Power Series!

Après l'événement, nous offrirons un Powerstick Minuet Portable Speaker* aux 1000 premiers participants éligibles qui passeront une commande aux États-Unis et aux 150 premiers au Canada.





Rutrun Vehicula Fermentum Lacinia Enim

Hôte

Ryan Kalember
Ryan Kalember | Chief Strategy Officer, Proofpoint, Inc.

With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

Panélistes

Daniel Blackford
Daniel Blackford | Sr. Manager, Threat Research, Proofpoint, Inc.

Formerly a researcher himself, Daniel currently leads Proofpoint's threat research team devoted to tracking financially-motivated actors. From high-profile botnets to credential harvesting and business email compromise, Daniel's team is in the weeds everyday leveraging Proofpoint's world class visibility to make high-confidence attributions and to share their findings with defenders across the world. Prior to his work at Proofpoint, Daniel worked as a malware analyst at the NCFTA and got his start tracking adversaries as a combat engineer with the US Army.


Alexis Dorais-Joncas
Alexis Dorais-Joncas | Sr. Manager, Threat Research, Proofpoint, Inc.

Alexis Dorais-Joncas is the Senior Manager of Proofpoint’s APT research team, where he and his team of threat researchers and intelligence analysts focus on tracking the most elusive state-sponsored threat actors and ensuring Proofpoint customers are protected against these persistent attackers. Prior to joining Proofpoint, Alexis led ESET’s Montreal-based R&D branch office for over 10 years, where his team focused on malware research, network security and targeted attacks tracking. Alexis is an established speaker on current cyberthreats, having spoken in front of diverse audiences at events such as Northsec, Bluehat, Botconf, First CTI, Sector and Rightscon. He has also been quoted in several security and technical media such as Wired, ITWorldCanada and Ars Technica, with broadcast appearances on Radio-Canada and Skynews. Alexis holds an M. Sc. in Electrical Engineering from the University of Sherbrooke in Canada.


Sarah Sabotka
Sarah Sabotka | Sr. Threat Researcher, Proofpoint, Inc.

Sarah Sabotka is a Senior Threat Researcher on the Threat Research Team at Proofpoint where she focuses on commodity crimeware campaigns and communicating the threat landscape to customers and the public. Sarah had her start by doing OSINT collection, case development, and law enforcement collaboration to support animal cruelty investigations for an international animal welfare organization. Prior to joining Proofpoint, Sarah spent over four years developing and leading the Global Cyber Threat Intelligence team at Experian, where she was also responsible for leading brand monitoring, threat hunting, vulnerability intelligence, and ad-hoc incident response activities; before that she was a Senior Threat Analyst at Goldman Sachs. Sarah earned her B.A. in English from the University of Connecticut (Storrs), and her M.S. in Cybersecurity from Utica College. She resides in southern New Hampshire where she runs a 501(c)3 animal rescue and sanctuary with her husband, home to 14 rescue dogs and four rescue fish.




Zoom | Mercredi 22 mai 2024
10-11 HNP | 12-13 HNC | 13-14 HNE (continent américain)

L'impératif de sécurité centré sur l'humain


Chez Proofpoint, nous défendons depuis longtemps la cybersécurité centrée sur l'humain en tant que priorité essentielle pour les équipes de sécurité informatique. Alors que les contrôles de sécurité traditionnels luttent plus que jamais contre les menaces modernes, l'industrie dans son ensemble se lance enfin dans cette idée. Mais à quoi ressemble la sécurité centrée sur l'humain dans la pratique ?

Au cours de cette rencontre, nous explorerons les tenants et les aboutissants de mettre les gens au centre de vos cyberdéfenses. Découvrez les quatre principales catégories de risques liés à l'humain – menaces, usurpation d'identité, identité et perte de données – et la meilleure approche pour aborder chacune de manière proactive et holistique.

Rejoignez cette Power Series où notre panel d'experts discutera:

  • Pourquoi la sécurité centrée sur l'humain change la donne pour les équipes de sécurité
  • Comment et où déployer l'IA le plus efficacement possible
  • Les synergies surprenantes entre la protection contre les menaces et le DLP

Obtenez votre cadeau Power Series!

Après l'événement, nous offrirons un iPrintIt Portable Wireless Printer* aux 1000 premiers participants éligibles qui passeront une commande aux États-Unis et aux 150 premiers au Canada.





Rutrun Vehicula Fermentum Lacinia Enim

Hôte

Chris Danyo
Chris Danyo | SVP, Americas Sales, Proofpoint, Inc.

Chris Danyo is Senior Vice President of Sales for the Americas Theater at Proofpoint. Chris previously served as Vice President of Named Accounts for the Americas, where he successfully led Proofpoint's largest single segment. Chris has over 20 years of progressive sales leadership experience in the cybersecurity space. Before joining Proofpoint, Chris was at Hewlett Packard Enterprise (HPE) and Symantec in roles of increasing seniority and responsibility.

Panélistes

Cat Hwang
Cat Hwang | Sr. Director, Product Marketing, Proofpoint, Inc.

Catherine Hwang is a Sr. Director of Product Marketing at Proofpoint, where she drives product marketing strategy for cloud app security, information protection, and compliance. Hwang has been with Proofpoint for over 3 years. Prior to joining Proofpoint, she has held a variety of strategic and technical roles at companies such as McAfee and Mercury (acquired by Hewlett-Packard). Hwang has a degree in Computer Engineering degree from the University of Michigan.


Cheryl Tang
Cheryl Tang | Sr. Director, Product Marketing, Proofpoint, Inc.

Cheryl Tang leads product marketing for Core Email Security solutions at Proofpoint. She brings over 20 years of product marketing experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product marketing and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.


Jasmine Wu
Jasmine Wu | Senior Director, Product Marketing & Head of GTM Operations, Proofpoint, Inc.

Jasmine Wu is the Senior Director of Product Marketing and Head of GTM Operations at Proofpoint. She has over 15+ years of experience providing thought leadership and advisory in the emerging technologies space, including cloud collaboration, corporate risk protection, information governance, and digital transformation.

Zoom | Mercredi 12 juin 2024
10-11 HNP | 12-13 HNC | 13-14 HNE (continent américain)

Défendre les données à l'ère de l'IA


L'IA générative est l’excellente occasion d'accélérer l'innovation. Selon l'enquête mondiale de McKinsey, 25% des cadres supérieurs utilisent personnellement les outils de la GenAI (l’intelligence artificielle générative) pour leur travail.

Au cours de cette session, nos experts exploiteront comment permettre l’adoption de la GenAI (l’intelligence artificielle générative) en toute sécurité et encourager l'utilisation d'outils d'IA dans la prévention des pertes de données.

Rejoignez cette Power Series où notre panel d'experts discutera:

  • Comment la GenAI est utilisée et ses risques pour les données
  • Comment surveiller et contrôler l'utilisation de la GenAI
  • Comment les outils d'IA peuvent vous aider à protéger vos données

Obtenez votre cadeau Power Series!

Après l'événement, nous offrirons un DuoTalk Wireless Microphone* aux 1000 premiers participants éligibles qui passeront une commande aux États-Unis et aux 150 premiers au Canada.





Rutrun Vehicula Fermentum Lacinia Enim

Hôte

Brian Reed
Brian Reed | Sr. Director, Cybersecurity Strategy, Proofpoint, Inc.

Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.

Panélistes

Itir Clarke
Itir Clarke | Staff Product Marketing Manager, Proofpoint, Inc.

Itir Clarke is a Staff Product Marketing Manager for Proofpoint's Cloud App Security solutions. Before coming to Proofpoint, Itir worked with data center products at Cisco, Brocade and Sun Microsystems before that. Itir has over 20 years of information technology experience in Product Marketing and Management roles.



Joshua Linkenhoker
Joshua Linkenhoker | Field Security Architect, Proofpoint, Inc.

Josh is a leader in the Information Protection space that works with organizations to build comprehensive Information Protection programs. He is an experienced enterprise leader having held multiple director roles (Fortune 500) focusing on Information Protection, Cloud Security, and Email Security. At Proofpoint, Josh leads and educates both staff and clients on the Information Protection space, being an active participant in Proofpoint research, internal enablement, and speaking opportunities related to ITM and DLP.



Isabella DeLucia
Isabella DeLucia | Manager, Global Data Threat Analysis, Crane

Isabella Gracy designed, implemented, and now manages an Insider Threat program within Crane Company, a global diversified manufacturing conglomerate. Her past investigative experience accompanied by an educational background in forensic psychology brings a unique perspective to managing Insider Threats cross-functionally. Isabella is particularly passionate about building security culture with a human-centric approach. Prior to working in Insider Threat, Isabella specialized in supply chain security investigations and intelligence analysis. She holds multiple Insider Threat and related industry certifications, and degrees from the University of New Haven in Psychology and Criminal Justice.


(ISC)2 CPE Logo

Gagnez des crédits FPC – (ISC)²

Cet événement est approuvé et cautionné par (ISC)². Les crédits FPC seront automatiquement crédités sur votre compte de membre dans un délai de 4 à 6 semaines.

Participants admissibles

Cet événement s'adresse aux décideurs en matière de sécurité des informations : équipe de direction, VP informatique, directeur informatique; responsables de la sécurité des informations (directeur de la sécurité, responsable de la sécurité informatique, responsable informatique); et équipes techniques chargées de la sécurité des informations (ingénieur sécurité, architecte messagerie, analyste informatique).

REMARQUE : pour vous inscrire, vous devez disposer d'une adresse courriel valide basée sur le domaine de votre entreprise. Les adresses Gmail, Hotmail, AOL, Yahoo! ou de tout autre fournisseur d'accès Internet ne sont pas acceptées.



Conditions générales

* Offre sous réserve de disponibilité. La valeur de ces cadeaux s'élève à 25 $. Voir ci-dessus pour plus d'informations sur la nature des différents cadeaux. L'envoi du cadeau n'est pas subordonné à la conclusion d'un contrat avec Proofpoint, Inc. En acceptant ce cadeau, vous déclarez et garantissez (1) que vous n'êtes ni représentant, ni employé, ni sous-traitant d'une quelconque administration nationale, fédérale, provinciale, étatique, municipale ou autre, ni d'une quelconque agence gouvernementale ou de toute autre entité semi-publique (« Organisme public »), (2) que vous n'avez aucun lien de parenté avec un représentant, un employé ou un sous-traitant d'un Organisme public, (3) que votre acceptation de ce cadeau n'enfreint aucun code de conduite ni aucune politique similaire de votre employeur, que vous avez informé votre employeur de cette offre et que ce dernier a exprimé son accord quant à son acceptation.

** Les participants admissibles incluent les décideurs en matière de sécurité des informations : équipe de direction, VP informatique, directeur informatique; responsables de la sécurité des informations (directeur de la sécurité, responsable de la sécurité informatique, responsable informatique); et équipes techniques chargées de la sécurité des informations (ingénieur sécurité, architecte messagerie, analyste informatique) travaillant dans des entreprises basées aux États-Unis ou au Canada. Cette offre n'est pas accessible aux consultants indépendants ou aux partenaires technologiques et commerciaux.