Information Protection for the
Modern People Perimeter
How do you define the security perimeter when the work world as we know it has changed? With work-from-anywhere, data is everywhere and now people are the new security perimeter.
Whether negligent, compromised or malicious, insider risk is on the rise.
According to the latest Verizon Data Breach Report, insiders have driven 30% of all recent data breaches.
Traditional Enterprise Data Loss Prevention (DLP) tools often miss insider incidents.
Without the context of the “who, what, where and when” around each alert, event, and activity, it’s difficult to establish user intent behind each action and timeconsuming to distinguish between risky actions vs.
normal business.
That’s why a people-centric approach to information protection is essential.
Join us to learn how a modern, unified information protection solution brings content, user behavior and threats together, to detect and prevent data loss and mitigate insider risk.
During this Tech Talk, we'll discuss how to:
Proofpoint Tech Talks are 30-minute technical discussions brought to you by engineers, for engineers. They cover a range of topics and feature technical deep dives, demos, customer stories, and live Q&A with Proofpoint experts.
Nirav Shah is a product management leader for Proofpoint’s insider threat and DLP product line. Prior to Proofpoint, he led the SASE (Secure Access Service Edge) initiative at Forcepoint to help accelerate digital transformation of distributed enterprises. During his career, Nirav has held product management, engineering leadership, and technical roles in large networking & security companies as well as venture-backed startups. His domain experience includes areas of network & cloud security, security analytics, and MSSP deployments.
Tony Kubinski is a Sr Sales Engineer for Proofpoint, based in the Chicagoland area. He entered the computing field when paper tape and time sharing were en vogue, and worked for companies including: a mini-computer vendor that battled against HP and DEC, the workstation vendor that changed the world with NFS and Java, and Linux high performance cluster vendors that had entries on the Top500.org list. Focusing on the security space for the last 15 years, he has experience with data loss prevention, endpoint security, and insider threat solutions.
This event is suitable for mid-level information security management (IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.