VIRTUAL
The event has already taken place, thanks for checking!
The event has already taken place, thanks for checking!
VIRTUAL
In today’s increasingly complex IT environments, many organizations struggle with managing legacy data, retention policies and mitigating legal/compliance risks, all while dealing with limited IT resources. A proven archiving solution can be the foundation for addressing these and other legal and compliance challenges. Organizations need to take proactive steps towards a policy driven litigation readiness plan, ensuring that data is not only collected but can be reviewed and produced in a manner that satisfies their legal obligations, as well as business needs.
Join us for this hour-long session to help you empower your IT, Legal and Compliance teams to achieve success.
In this session you will learn:
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
Mike Fenili is a Staff Sales Engineer for Proofpoint responsible for educating and enabling organizations to securely archive email, enterprise social, and collaboration data into the Proofpoint Archive, addressing their e-Discovery, regulatory compliance, retention, & litigation hold requirements. With nearly 20 years of experience, 11 of which with Proofpoint, he is a dedicated Archive Compliance, and eDiscovery technical resource, working as a technical specialist and domain expert at both vendors and partners. Mike delivers deep technical demonstrations and leads technical conversation during the pre-sales process, working with all title levels including Administrators, Compliance Officers & Legal Counsel to address client’s needs and provide education on the Proofpoint Solutions. He has been instrumental in closing numerous opportunities including many of the largest and most complex Fortune 500 and Global 2000 accounts.
Having worked in the compliance technology industry for nearly a decade, Dennis has developed a comprehensive understanding of the risks and challenges organizations face in managing increasing volumes of data. As a senior specialist for Archiving, Compliance & eDiscovery, Dennis regularly consults with clients on leveraging Proofpoint’s industry-leading technology to capture, manage, discover, and supervise data related to litigation, internal investigations, and regulatory inquiries. Dennis brings an extensive knowledge of regulatory compliance, litigation readiness, and data management issues to his role.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
EVP, Cybersecurity Strategy, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
SVP, Systems Engineering and Customer Success, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Director of Development proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Parking Information
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Integer Congue Massa
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Financial services firms and other highly regulated organizations face the world’s toughest regulatory scrutiny. FINRA, SEC, MiFD II and IIROC, require formal retention and supervisory review programs for all communications, making the need for compliance more prevalent than ever. Whether you’re just getting started implementing a compliance framework, have identified missing key elements in your supervision model, or need to improve the review process, this hour-long session will help you determine actionable steps to take on how to supervise and monitor content effectively.
In this session you will learn:
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
John is Proofpoint's Market Development Principal and Compliance Officer. John holds a Law Degree with a concentration in Corporate and Securities Law from Rutgers Law School and holds FINRA Series 7, 24, and 4 Principal registrations. Prior to joining Proofpoint, John was a financial services compliance officer and is still very active as an industry advisor to asset managers, banks, and brokerages.
Mike Fenili is a Staff Sales Engineer for Proofpoint responsible for educating and enabling organizations to securely archive email, enterprise social, and collaboration data into the Proofpoint Archive, addressing their e-Discovery, regulatory compliance, retention, & litigation hold requirements. With nearly 20 years of experience, 11 of which with Proofpoint, he is a dedicated Archive Compliance, and eDiscovery technical resource, working as a technical specialist and domain expert at both vendors and partners. Mike delivers deep technical demonstrations and leads technical conversation during the pre-sales process, working with all title levels including Administrators, Compliance Officers & Legal Counsel to address client’s needs and provide education on the Proofpoint Solutions. He has been instrumental in closing numerous opportunities including many of the largest and most complex Fortune 500 and Global 2000 accounts.
Having worked in the compliance technology industry for nearly a decade, Dennis has developed a comprehensive understanding of the risks and challenges organizations face in managing increasing volumes of data. As a senior specialist for Archiving, Compliance & eDiscovery, Dennis regularly consults with clients on leveraging Proofpoint’s industry-leading technology to capture, manage, discover, and supervise data related to litigation, internal investigations, and regulatory inquiries. Dennis brings an extensive knowledge of regulatory compliance, litigation readiness, and data management issues to his role.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
EVP, Cybersecurity Strategy, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
SVP, Systems Engineering and Customer Success, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Director of Development proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Parking Information
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Integer Congue Massa
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Not every insider risk turns into an insider threat, but every insider threat began as an insider risk. During National Insider Threat Awareness Month, we’re reminded that almost two-thirds—63%—of global CISOs say they have had to deal with the loss of sensitive information in the past year, according to the Proofpoint 2023 Voice of the CISO report. That’s why security leaders need an insider risk mitigation program that encompasses people, processes and technology for successful early intervention, detection and mitigation of insider threats. How can executives build out these robust defenses and build internal buy-in by contextualizing their risk mitigation strategies within the framework of the larger corporate risk framework?
In this Power Series, our panel of experts will discuss:
After the event, we’ll be giving away a Pickleball Set to the first 1,000 qualified attendees who place an order.
Power Series Gifts are only available to qualified attendees** in the U.S. or Canada.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.
Kevin is an Information and Cloud Security Specialist, Certified Insider Threat Program Manager, and Insider Threat Vulnerability Assessor. For 10+ years Kevin has held various client-facing roles helping clients solve problems around insider threats, data loss prevention, and cloud security.
Jeremy Wittkop is Proofpoint’s Principal Security Architect. As InteliSecure’s former Chief Technology Officer, Jeremy was a foundational architect for InteliSecure’s internationally recognized Data Protection, Cloud Security, and User and Entity Behavior Analytics Services. Jeremy is a trusted data protection thought leader -- published author, blogger, public speaker, and advisor to clients and formerly public and private equity investors.
Erich Anderson serves as a professional consultant for ObserveIT who brings experienced information security knowledge of over 15 years around Insider Threat, cyber security and risk mitigations. Previously, Anderson was responsible for running fusion, analytics, and mitigations at the FBI where his leadership, teams and platforms assisted numerous insider threat investigations, e-discovery requests and complex technical challenges on a regular basis. He is known to build effective insider threat programs and assisted in the creation of national policy and minimum standards for insider threat as directed via EO 13587 and was a founding member of the National Insider Threat Task Force. Anderson has a passion for assisting people understand policies, implementing best practices and sharing lessons learned in all information security realms with a specialty around insider threat.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
EVP, Cybersecurity Strategy, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
SVP, Systems Engineering and Customer Success, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Director of Development proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Parking Information
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Integer Congue Massa
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Tabletop exercises may uncover some supply chain and third-party risks. But few organizations doing them last year could have foreseen the effects of geopolitical conflict. Add to the mix a myriad of new risks—from cloud-based solutions to hybrid work environments and remote work—and CISOs have a lot to deal with. CISOs can transfer some responsibility for risks to cloud and third-party vendors. Ultimately, however, they’re accountable when it comes to keeping their organizations safe.
The good news is that third-party risk is no longer a new topic. The same frameworks that CISOs use to assess their internal risk can be applied to vendors. In fact, companies with thousands of vendors often create risk-based tiering for their third-party processes. In addition, new cybersecurity solutions and features can reduce the level of effort required. With a little trial and error, CISOs can design a third-party risk program that aligns with their business needs.
In this Power Series, our panel of resident CISOs will discuss:
After the event, we’ll be giving away a Tile Sticker Bluetooth Tracker* to the first 1,000 qualified attendees who place an order.
Power Series Gifts are only available to qualified attendees** in the U.S. or Canada.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
Lucia Milică Stacy serves as VP, Global Resident Chief Information Security Officer at Proofpoint, a leading cybersecurity and compliance company. She is a senior technology leader with over 20 years of extensive technical and business experience. In her previous role, Lucia was the VP, Chief Information Security Officer & Chief Privacy Officer for Polycom, where she managed all aspects of data privacy and information security. She has also held leadership and technical roles in IT governance & strategy, security risk and compliance, corporate and product security, data privacy, and IT infrastructure at other companies, including HP, Palm, Wells Fargo, and Franklin Templeton. Many organizations in the cybersecurity industry and broader business community have asked her to speak at their conferences, symposiums, and other events. She has also extended her contributions to her profession by serving as an advisory board member and active participant with the cybersecurity industry and relevant industry groups, including board membership on the National Technology Security Coalition, and service with the Department of Health and Human Services (HHS) 405(d) Cybersecurity Task Group, SC Media Advisory Board, and Forbes Technology Council. She has a Master of Science in Information and Cybersecurity degree from the University of California, Berkeley. She also holds Master in Business Administration and Juris Doctorate degrees.
John C. Checco is an information security professional providing subject matter expertise across various industries. He is currently a leader for the CISO Advisory Board on Financial Services for Proofpoint and President Emeritus of the New York Metro InfraGard Members Alliance (an FBI public/private partnership program). Checco has been an active contributor to the Strategic Advisory and Content Committee of the WSTA (Wall Street Technology Association) since 1997, active in InfraGard’s New York Metro Chapter since 2003. He is also a member of several other security organizations (ASIS, ISSA, IASCP, ISC2 and OWASP), and co-founder and co-chair of the New York Metro Joint Cyber Security Conference and Workshop series since 2014. Prior to his current role, Checco served in an executive capacity with Bank of America’s Global Information Security Innovation Group and as Senior Information Security and Risk Advisor for Bloomberg L.P. He is founder of Checco Services Inc., an information security consulting firm that patented the award-winning bioChec™️ keystroke and gesture biometric technologies.
Andrew has joined Proofpoint from Mastercard, where he was the Chief Security Officer of their subsidiary firm, Vocalink, a firm which provides the transactional backbone of the financial services industry in the UK. Prior to that Andrew held the CISO role at the UK Air Traffic Control provider, NATS, where he oversaw a security transformation and contributed to the design of the next generation air traffic control system. Andrew has also held CISO roles at two top tier global law firms, Allen Overy LLP and Clifford Chance LLP. In between these roles, Andrew was a Principal Analyst at Forrester Research where he covered the role of the CISO and Security Culture & Awareness as two of his specialty areas. Andrew was recognized as European CISO of the year (2018) and has previously won awards for devising and leading the Best security awareness program (2015). Andrew holds a master’s degree in information security, is a regular speaker at global security conferences (including RSA in 2019) and has contributed to media outlets such as the Wall Street Journal, the Financial Times, the Washington Post, Wired magazine and the Times newspaper. Andrew also appeared in the CNBC documentary entitled Rise of the Machines.
Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah has worked with both public and private sector organizations across the Fortune 1000 as an employee or consultant. Deborah has a Master’s degree in Information Technology Management from Harvard University and is a Doctoral Candidate in Psychology (PsyD) at California Southern University. Ms. Watson has published papers and presented on a variety of topics including GDPR, IoT, BEC and Phishing, Third-Party Risk Management, and Open Source Security.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
EVP, Cybersecurity Strategy, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
SVP, Systems Engineering and Customer Success, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Director of Development proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Parking Information
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Integer Congue Massa
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Insider threats are the top cybersecurity concern among chief information security officers (CISOs) globally, according to the Proofpoint 2022 Voice of the CISO report. Digital transformation, work-from-anywhere environments and employee turnover are increasing insider risk. As the modern way of working shifts, more data is generated and cloud adoption accelerates, CISOs are questioning if their legacy solutions can meet today’s demands. There is one constant factor among these ongoing shifts: people. After all, data doesn’t lose itself; people lose data. And more than half the time, insider threats can be attributed to careless users. These users unknowingly or unintentionally impact an organization’s data or systems negatively.
In this Power Series, our panel of experts will discuss:
After the event, we’ll be giving away a New Balance Logo Round Backpack* to the first 1,000 qualified attendees who place an order.
Power Series Gifts are only available to qualified attendees** in the U.S. or Canada.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.
Josh Linkenhoker is an information security leader who works with organizations to build comprehensive information security programs. On every project, Josh sees his role as a partner and educator. His goal is to increase the understanding of everyone he works with by building trust and confidence. Josh’s approach to security is business-first. He believes that every security project should be set up in a way that prioritizes business performance and fidelity. And while security controls are important for protecting the business, they shouldn’t impede business operations. Josh has held multiple enterprise director level roles where he has overseen information security teams that focus on information protection, cloud security and email security. During his work as a consultant, he specialized in building successful information security programs for enterprise organizations. His career began in the public sector where he served as a leader in the U.S. Military Intelligence Corps. Since then, he has touched all verticals in the private sector. Today, Josh focuses on building programs that identify and secure data at rest in the environment. His programs feature solid data loss prevention controls on the edge that keep sensitive data inside the environment. And these programs extend to the cloud and SaaS products. With every program, his goal is to ensure that companies can do business any way they want to, safely and securely, and in partnership with compliance, legal, and other stakeholders.
Stephanie is a Senior Product Marketing Manager at Proofpoint, where she is responsible for the messaging and positioning of its Insider Threat Management and Endpoint Data Loss Prevention solutions. Before joining Proofpoint, Stephanie held a variety of roles spanning product marketing, customer research, and market strategy at IBM. Prior to IBM, Stephanie spent several years as an industry analyst at IDC, providing insights and advice on market trends and industry dynamics to executives at leading technology and IT services firms. Stephanie holds a BA degree from Union College and an MBA from Babson College.
Jeremy Wittkop is Proofpoint’s Principal Security Architect. As InteliSecure’s former Chief Technology Officer, Jeremy was a foundational architect for InteliSecure’s internationally recognized Data Protection, Cloud Security, and User and Entity Behavior Analytics Services. Jeremy is a trusted data protection thought leader -- published author, blogger, public speaker, and advisor to clients and formerly public and private equity investors.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
EVP, Cybersecurity Strategy, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
SVP, Systems Engineering and Customer Success, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Director of Development proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Parking Information
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Integer Congue Massa
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Cloud applications and information stored in or hosted in the cloud have become mainstream for most organizations. As adoption continues, we must focus on security in these modern modes of application usage and information sharing to adequately protect people and organizations from threats, data loss and compliance risk.
Join our panel of experts in this Power Series to learn:
After the event, we’ll be giving away a Nike Dri-Fit Swoosh Perforated Cap* to the first 1,000 qualified attendees who place an order.
Power Series Gifts are only available to qualified attendees** in the U.S. or Canada.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
In libero ex, luctus vel consectetur sit amet, lacinia sed nisi. Phasellus at vulputate augue. Aenean id semper elit, facilisis rutrum libero. Curabitur blandit pretium accumsan. Proin scelerisque purus quam, facilisis tristique lectus elementum interdum. Cras non pharetra massa. Sed quis sodales neque. Fusce consequat eget nibh ut condimentum. Vivamus tempor vitae sapien eget scelerisque.
Ron is the Vice President, Americas Systems Engineering at Proofpoint. In his current role, he is responsible for leading the technical sales organization in helping customers solve their evolving cyber security challenges. As a 15 year veteran in this space, Ron has worked with some of the largest companies in the world advising them on managing risk. He also holds CISSP and CCSK certifications. Prior to joining Proofpoint, Ron lead systems engineering teams at a number of other cyber security organizations. His specialties have included email messaging, web security and DLP.
Erin Leonard is Proofpoint’s Global Director of Sales Engineering for Sigma Information Protection. She has more than 15 years of experience with Information & Cyber Security, focused on enterprise risk and remediation. She started her career in enterprise compliance at Fidelity Investments and Iron Mountain Records Management before spending 10 years at RSA Security, focused on the Archer Governance, Risk and Compliance business. Erin’s background as a systems administrator, Professional Services consultant and Presales technical leader of security technology has given her the ability to view risk from people, process and technology perspectives. Erin graduated from the University of Vermont and received her MBA from Bryant University and her MSCIS from Boston University. She lives in the Boston area and has a passion for exercise and running – she has completed 8 full marathons including Boston, Chicago, Berlin and NYC.
Rob Randell is currently Global SE Director for Proofpoint's Advanced Technology Group. In this role, he leads a team of Systems Engineers and Architects to help customers and partners get the most out of Proofpoint's advanced technologies, including Information Protection, Cloud Security, Security Awareness Training, and Email Fraud Defense. Before Proofpoint, Rob was a Director in the Security and Risk Practice at ServiceNow. Rob is a regular speaker at different events, from local ISSA Meetings to larger security conferences such as the RSA Conference. Rob's career has been deep into information security through several avenues. Virtualization security and micro-segmentation through the hypervisor at VMware, endpoint memory-based protection with startup Determina (acquired by VMware), anti-malware at Webroot, and before that Vericept, which was the original player in the DLP space.
Denis Ryan is Vice President, Information Protection and Cloud Security Sales for Proofpoint, Inc. Previously, Denis held management positions at several well-known technology companies, including Nominum (now part of Akamai), Tellabs (now Coriant), Verizon and IBM. As a sales leader of the fastest growing business unit in Proofpoint, Ryan oversaw the go- to- market sales and sales engineering strategy after the Return Path business unit acquisition. Ryan’s diverse background in IT and security solutions enables him Ryan to overlay the Proofpoint sales efforts in multiple verticals, most notably Healthcare, as Proofpoint has ramped up this specialized team to improve email authentication practices. He resides in the Dallas-Fort Worth metroplex, mentors undergraduates for his alma mater (University of Dallas) and volunteers his time for various local charities.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
EVP, Cybersecurity Strategy, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
SVP, Systems Engineering and Customer Success, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Chief Technical Officer, proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Director of Development proofpoint
Vivamus male suada eget eu pos uere in bibendum orci id vest.
Parking Information
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
Integer Congue Massa
Curabitur erat felis, porttitor ac iaculis sed, egestas eu nulla. Aliquam placerat ultrcies eros, facilis hendrerit turpis. Pellentesque laoreet orci placerat lacus condimentum, eu placerat dolor commodo.
This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.
This event is suitable for compliance decision-makers, including: General Counsel, Chief Compliance or Privacy Officer; mid-level compliance/privacy management (Compliance Manager); and compliance/privacy practitioners (Compliance/Risk Assistant, Compliance Administrator). It is also suitable for information security decision-makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.
NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.