You're invited


Proofpoint Spotlight

This event has already taken place. You can watch the recording on-demand here or visit proofpoint.com/events for upcoming events near you.


Identities are a company’s crown jewels for access and privilege in corporate systems, and attackers have begun to focus on compromised identities to enable data exfiltration, take over IT environments and launch ransomware attacks. How can you protect your organization from attackers who exploit gaps between identities and your security systems?

Join us for a discussion and demonstration on:

  • Why identity is such a big problem right now
  • Challenges in identifying vulnerable identities
  • Best practices to protect your people and data from attacks leveraging compromised identities

Featured Speaker

Ofer Israeli
Ofer Israeli | GVP, General Manager, Identity Threat Defense, Proofpoint, Inc.

Ofer Israeli is the Group Vice President and General Manager of Proofpoint’s Identity Threat Defense business. In this role, Ofer drives both strategy and technology development to help the world’s leading multinational organizations detect active attacks within their environments and manage their identity risk. With more than 15 years of cybersecurity and IT leadership experience, Ofer joined Proofpoint through the acquisition of Illusive, a leader and pioneer in Identity Threat Detection and Response (ITDR), which Ofer founded and led as its CEO. Previous to founding Illusive, Ofer managed development teams around the globe for Check Point Software Technologies and worked in the Atom Chip Lab at Ben-Gurion University, where he focused on theoretical quantum mechanics. Ofer holds B.Sc. degrees in Computer Science and Physics from Ben-Gurion University of the Negev in Israel.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.