Combat Data Loss
and Insider Risk

This event has already taken place. Please visit for upcoming events near you.

Remote work, combined with cloud adoption and unprecedented employee turnover, has created a perfect storm for organizations trying to protect their most strategic and sensitive data. Insider threats are the top cybersecurity concern among CISOs globally. As the Data Loss Prevention (DLP) and Insider Threat Management (ITM) markets converge, a people-centric approach is required to fuel your cybersecurity strategy. The primary objective of both sets of technology is to prevent data loss and misuse of data. DLP monitors file activity and leverages content scanning to determine whether users are handling sensitive data according to corporate policy. ITM monitors user activities such as application usage, user input/output, website access and file movement. It also captures screenshots of high-risk activity for visual evidence to accelerate investigations.

Join us at Proofpoint Discovery where you’ll get hands-on experience with Proofpoint products. In this free workshop, you will learn:

  • Best practices on how to protect people and defend data
  • How to detect and respond to potential insider threats
  • How to investigate insider threat and data loss incidents
  • How to stop data loss through cloud sharing tools and personal webmail
  • And much more!

Earn Your Badge!

You'll receive this badge upon completion of the Proofpoint Discovery: Hands-on Lab - Combat Data Loss and Insider Risk, designed to help organizations combat data loss and insider risk.

Reminder: In order to participate in the hands-on lab, you will need to bring your own personal laptop.


  • 8:00AM-8:30AM
    Registration & Breakfast
  • 8:30AM-9:00AM
    Introductions, Overview and Logistics
  • 9:00AM-11:00AM
    Lab Exercise
  • 11:00AM-11:30AM
    Recap & Q&A

Who Should Attend

This event is suitable for information security decision-makers, including: Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.