You're invited


Proofpoint Spotlight

Zoom | Wednesday, July 26, 2023 | 12:30PM-1:30PM ET


Third-party and supply chain risk are no longer a new topic. The use of cloud solutions, third party vendors, and outsourcing continue to increase, and these relationships can create risk. For organizations with thousands of vendors, managing risk can be overwhelming. But the same frameworks security teams use to assess their internal risk can also be applied to vendors. Lets’ talk about managing the genie inside the bottle.

Join Proofpoint for an informative one-hour discussion on Supply Chain and Third-party Risk. You will learn from a series of speakers who will explore this topic and discuss solutions that can help manage risk, including:

  • How to look at supply chain and Third-party Risk from a business and security lens, and what you need to think about
  • Leveraging Proofpoint Supply Threat Detection to find the genie
  • Utilizing Email Fraud Defense to protect your reputation and to identify, assess, and prioritize risky suppliers
  • Identifying risky Third-party identities inside your environment and how we can provide access and connection visibility to bottle up the genie

Agenda

  • 12:30PM
    Welcome and introductions
  • 12:35PM
    How to look at supply chain and third-party risk
  • 12:50PM
    Leveraging Proofpoint Supply Threat Detection
  • 1:05PM
    Utilizing Email Fraud
  • 1:20PM
    Identifying risky third-party identities

Featured Speakers

Jonathan Molina
Jonathan Molina | Sr. Sales Engineer, Proofpoint, Inc.

With over 20 years experience in IT working desktop, datacenter engineer, network engineer, systems engineer, and responsible for many organizations security programs, then working on the vendor side for app security (Tufin), Netflow analysis (Cisco), threat intelligence/SOAR (ThreatConnect), packet capturing (Endace), pentesting (Pentera), and now ITDR (Proofpoint/Illusive). I bring a different perspective, very well-rounded view in security.

Deborah Watson
Deborah Watson | Resident CISO, Proofpoint, Inc.

Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah has worked with both public and private sector organizations across the Fortune 1000 as an employee or consultant. Deborah has a Master’s degree in Information Technology Management from Harvard University and is a Doctoral Candidate in Psychology (PsyD) at California Southern University. Ms. Watson has published papers and presented on a variety of topics including GDPR, IoT, BEC and Phishing, Third-Party Risk Management, and Open Source Security.

Renga Srinvas
Renga Srinvas | Global VP Product Detection Solutions, Proofpoint, Inc.


Mike Schenck
Mike Schenck | Sr. Leader Secure Sender, Proofpoint, Inc.

Mike Schenck is an Advanced Technology Specialist for the Email Fraud Defense division within Proofpoint. Mike specializes in email identity deception and consults with clients to advise protections against Business Email Compromise. Throughout Mike’s career he has been able to uncover a multitude of identity deception attacks targeting organizations’ employees, business partners, and consumers.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.