Zoom | Tuesday, March 2, 2021 | 1:00PM-1:30PM ET

How do you define the security perimeter when the work world as we know it has changed? With work-from-anywhere, data is everywhere and now people are the new security perimeter. Whether negligent, compromised or malicious, insider risk is on the rise. According to the latest Verizon Data Breach Report, insiders have driven 30% of all recent data breaches.

Traditional Enterprise Data Loss Prevention (DLP) tools often miss insider incidents. Without the context of the “who, what, where and when” around each alert, event, and activity, it’s difficult to establish user intent behind each action and timeconsuming to distinguish between risky actions vs. normal business.

That’s why a people-centric approach to information protection is essential. Join us to learn how a modern, unified information protection solution brings content, user behavior and threats together, to detect and prevent data loss and mitigate insider risk.

During this Tech Talk, we'll discuss how to:

  • Prevent data loss scenarios
  • Reduce your mean time to respond (MTTR) with our simple-to-understand, timeline-based alert manager
  • See the context and establish user intent instantly during alert triage
  • Integrate our cloud-based, API-first platform and lightweight endpoint agent architecture
  • Reduce the costs of managing data loss and insider risk in one unified platform

Proofpoint Tech Talks are 30-minute technical discussions brought to you by engineers, for engineers. They cover a range of topics and feature technical deep dives, demos, customer stories, and live Q&A with Proofpoint experts.


Nirav Shah
Nirav Shah | Staff Product Manager, Insider Threat Management, Proofpoint, Inc.

Nirav Shah is a product management leader for Proofpoint’s insider threat and DLP product line. Prior to Proofpoint, he led the SASE (Secure Access Service Edge) initiative at Forcepoint to help accelerate digital transformation of distributed enterprises. During his career, Nirav has held product management, engineering leadership, and technical roles in large networking & security companies as well as venture-backed startups. His domain experience includes areas of network & cloud security, security analytics, and MSSP deployments.

Tony Kubinski
Tony Kubinski, Sr. Sales Engineer, Information Protection, Proofpoint, Inc.

Tony Kubinski is a Sr Sales Engineer for Proofpoint, based in the Chicagoland area. He entered the computing field when paper tape and time sharing were en vogue, and worked for companies including: a mini-computer vendor that battled against HP and DEC, the workstation vendor that changed the world with NFS and Java, and Linux high performance cluster vendors that had entries on the Top500.org list. Focusing on the security space for the last 15 years, he has experience with data loss prevention, endpoint security, and insider threat solutions.

Who Should Attend

This event is suitable for mid-level information security management (IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

(ISC)2 CPE Logo

Earn CPE Credits

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.