You're invited


Proofpoint Spotlight

Zoom | Tuesday, July 25, 2023 | 12:00PM-1:00PM CT


The last few years have brought unprecedented change. An increasingly distributed workforce, development and widescale adoption of new privacy laws/regulations, access to more data through more channels, and a shift to the cloud have transformed the nature of work. These trends have made protecting sensitive data more complicated and demanding. The situation is made worse by traditional cybercriminals and ransomware attackers who are stealing more data than ever and restricting access by encrypting it and maliciously publishing data for victims that refuse to pay. To meet these challenges, organizations must rethink how they prevent data loss, especially when it stems from insider threats.

Join us to learn how to:

  • How to connect the dots between sensitive content, user behavior and external threats for full context and visibility
  • Where to focus your Data Loss Prevention (DLP) efforts
  • Best practices for managing insider threats and risks to your organization
  • How Proofpoint expertise in the industry can help drive forward your program and align you for success

Featured Speaker

Josh Linkenhoker
Josh Linkenhoker | Field Security Architect, Proofpoint, Inc.

Josh is a leader in the Information Protection space that works with organizations to build comprehensive Information Protection programs. He is an experienced enterprise leader having held multiple director roles (Fortune 500) focusing on Information Protection, Cloud Security, and Email Security. At Proofpoint, Josh leads and educates both staff and clients on the Information Protection space, being an active participant in Proofpoint research, internal enablement, and speaking opportunities related to ITM and DLP.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.