Proofpoint Spotlight:

Vendor Consolidation

Zoom | Thursday, March 11, 2021 | 1:00PM-2:00PM ET

According to a recent Gartner survey, 75% of organizations are currently pursuing a vendor consolidation strategy or planning to do so in the next two to three years. CISOs are under increasing pressure to justify security spend, and protecting today’s all-remote workforce is a struggle with tightening budgets and limited headcount.

Managing multiple cybersecurity vendors can be very challenging with resource and support issues, ease of deployment, and scaling needs of the business. CISOs and budget holders need a more simpler way to justify security spend.

Join us at Proofpoint Spotlight: Vendor Consolidation, where you’ll have the opportunity to learn how to:

  • Improve your overall security posture, and save time and money by making the most of your resources
  • Gain visibility and apply proper controls to protect your users from multi-vector threats between email and cloud
  • Align information security with other parts of the business (business unit leads, procurement, finance, etc.)

As a thank you, each attendee will have the chance to win a Google Nest Hello Video Doorbell.

Agenda

March 11

  • 1:00PM-1:05PM
    Welcome and Introductions
  • 1:05PM-1:50PM
    Vendor Consolidation
  • 1:50PM-2:00PM
    Q&A

FEATURED SPEAKER

Jennifer Cheng
Jennifer Cheng | Director, Product Marketing, Proofpoint, Inc.

Jennifer Cheng is the Director of Cybersecurity Solutions at Proofpoint. She is dedicated to helping people and organizations better manage their risk of advanced attacks or compliance violation in email, mobile, social media, and cloud technologies. Cheng has over a decade of experience consulting and educating IT professionals on new technologies and industry trends. Prior to Proofpoint, Cheng held strategic and technical roles at Cisco, Salesforce, and WatchDox (acquired by BlackBerry). Cheng has a B.S. degree in Computer Science Engineering from the University of Michigan–Ann Arbor and an M.B.A. from the Wharton School of the University of Pennsylvania.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo, or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.