Zoom | Friday, May 14, 2021 | 10:00AM - 11:30AM HT

Join your fellow Proofpoint users at the virtual Hawaii Proofpoint User Group!

This interactive meeting will bring together local/state government and education and product experts to review the current threat landscape and product updates from Proofpoint. You’ll have the opportunity to hear from your peers on how they are leveraging Proofpoint and discuss your security-related questions with technical experts to help you optimize your investment in Proofpoint technologies.

At this virtual meeting, we’ll cover:

  • Top Trends in the Current Threat Landscape
  • Product Update: Nexus People-Risk Explorer
  • A Customer’s Perspective
  • Ask the Experts


May 14

  • 10:00AM - 10:05AM HT
    Welcome and Introductions
  • 10:05AM - 10:35AM HT
    Current Threat Landscape
  • 10:35AM - 11:05AM HT
    Product Update: Nexus People-Risk Explorer
  • 11:05AM - 11:15AM HT
    A Customer’s Perspective
  • 11:15AM - 11:30AM HT
    Ask the Experts

Featured Speakers

Duane Kuroda
Duane Kuroda | Threat Analyst, Proofpoint, Inc.

Duane Kuroda is a Group Manager for Proofpoint’s Advanced Technologies where he educates and trains customers and staff on advanced technologies and solutions that impact organizations through SaaS, social, mobile, email, and network channels. Before Proofpoint, Duane worked at NetCitadel on their Automated Incident Response solution. Duane holds three patents and an M.S. from Stanford University and a B.S. from Harvey Mudd College.

Mark Morgan
Mark Morgan | Senior Sales Engineer, Proofpoint, Inc.

Mark has been with Proofpoint for over five years as a Sales Engineer. Prior to joining Proofpoint, Mark spent more than three years at Microsoft and four years at Appsense in their engineering groups. Mark is based in Washington state and supports the SLED Pacific Northwest team and the state of Hawaii.

Who Should Attend

This event is suitable for Proofpoint customers who are responsible for protecting sensitive data, regulatory compliance, addressing evolving threats, improving/automating security operations, addressing cloud-related security issues, and improving the ability to analyze security data and detect attacks in real time.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or similar ISPs are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.