Proofpoint Spotlight Series

Zoom | Tuesday, March 16, 2021 | 1:00PM-2:00PM CT

A Modern Approach to Information Protection

Data Loss Prevention (DLP) solutions alone can no longer address today’s data privacy requirements. Personally Identifiable Information (PII) from customers is the most often lost or stolen data, and more than half of these breaches involve malicious attacks. Challenges like increasing threat activity, difficulty protecting a remote workforce and accelerating migration of data to cloud platforms make it harder to secure data and comply with privacy regulations—especially when analysts need multiple tools to investigate data leaks. So how can you better protect your company in 2021?

Join us as we discuss how you can reimagine data privacy with a modern approach to information protection. In this session, we’ll cover:
  • Modern data security challenges
  • The convergence of data and threat protection to secure data from internal and external threats
  • How people-centric investigations lead to more rapid investigative outcomes
As a thank you, each qualified attendee will receive a Home Care Box from Craftom.io, which includes an Ella B. Candle, 1lb bag of Climb's Roast Coffee and four wooden coasters.

Agenda

March 16

  • 1:00PM-1:05PM
    Welcome & Introductions
  • 1:05PM-1:50PM
    A Modern Approach to Information Protection
  • 1:50PM-2:00PM
    Q&A

Rutrun Vehicula Fermentum Lacinia Enim

FEATURED SPEAKER

Mike Stacy
Mike Stacy | Global Cloud and Information Protection Director, Proofpoint, Inc.

Mike Stacy is Global Cloud and Information Protection Director at Proofpoint. Stacy works with customers and oversees technical strategy for areas that include cloud security, advanced email defense, SOAR, browsing security and SDP. Prior to joining Proofpoint, Stacy held numerous technical leadership and product strategy roles across a variety of solutions.

Zoom | Tuesday, March 23, 2021 | 1:00PM-2:00PM CT

Protecting Against the Modern Threat Landscape

Attackers are constantly evolving their tactics to target your people. They combine multiple vectors – email, cloud accounts, and trusted third parties – to spread malware, harvest credentials, and steal money. Because attackers never stop, you need an integrated, layered approach to defending against email and cloud threats. Join us at Proofpoint Spotlight: Protecting Against the Modern Threat Landscape, where you’ll have the opportunity to hear:

  • The latest on the threat landscape
  • How to best protect your people within the rapidly changing landscape
  • Strategies for educating users and turning them into a strong line of defense

As a thank you, each qualified attendee will receive a Home Care Box from Craftom.io which includes an Ella B. Candle, 1lb Climb's Roast Coffee, and four wooden coasters.

Agenda

March 23

  • 1:00PM-1:05PM
    Welcome & Introductions
  • 1:05PM-1:50PM
    Protecting Against the Modern Threat Landscape
  • 1:50PM-2:00PM
    Q&A

Rutrun Vehicula Fermentum Lacinia Enim

FEATURED SPEAKER

Cheryl Tang
Cheryl Tang | Director, Product, Proofpoint, Inc.

Cheryl Tang leads product for Core Email Security solutions at Proofpoint. She brings over 20 years of product experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.

Zoom | Tuesday, March 30, 2021 | 1:00PM-2:00PM CT

A People-Centric Compliance Posture for the New Virtual Enterprise

After the wake of the 2020 pandemic, most organizations are undergoing evaluation of their existing information governance, protection, and compliance frameworks. When more than 85% of the American workforce took its interactions digital, the corporate governance and regulatory compliance policies that were in place were no longer good enough. With a 300% increase in usage for Zoom, 120M+ active users on Microsoft Teams, and many others electronic communications alike, Information, IT, Compliance, and Legal teams will need a modern way to identify fraudulent business, insider risks, and compliance violations and conduct fast, accurate investigations.

Join us for a discussion on a people-centric approach to Compliance and eDiscovery. We’ll review:

  • Where your corporate and regulatory risks may reside in your new virtual enterprise
  • An all-in-one people-centric approach to Compliance, eDiscovery, and Supervisory
  • The impact of a modern compliance management technology stack for IT, Information Management, Compliance and Legal teams

As a thank you, each qualified attendee will receive a Home Care Box from Craftom.io, which includes an Ella B. Candle, 1lb bag of Climb's Roast Coffee and four wooden coasters.

Agenda

March 30

  • 1:00PM-1:05PM
    Welcome & Introductions
  • 1:05PM-1:50PM
    A People-Centric Compliance Posture for the New Virtual Enterprise
  • 1:50PM-2:00PM
    Q&A

Rutrun Vehicula Fermentum Lacinia Enim

FEATURED SPEAKER

Jasmine Wu
Jasmine Wu | Director, Product, Proofpoint, Inc.

Jasmine Wu is the Director of Product at Proofpoint. She has over 12+ years of experience providing thought leadership and advisory in the emerging technologies space, including corporate risk protection, information governance, cloud collaboration management, and digital transformation.

(ISC)2 CPE Logo

Earn 1 CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.