Donec leo tortor, feugiat non molestie eget, semper eu quam. Suspendisse nec erat eu nunc porttitor volutpat nec molestie arcu. Nam pharetra id odio in hendrerit.
Join your fellow Proofpoint users at the virtual South Central SLED Proofpoint User Group!
This interactive meeting will bring together local, state and education Proofpoint users, threat researchers and product experts to review the current threat landscape and product updates from Proofpoint. You’ll have the opportunity to hear from your peers on how they are leveraging Proofpoint and discuss your security-related questions with technical experts to help you optimize your investment in Proofpoint technologies.
At this virtual meeting, we’ll cover:
As a highly accomplished thought leader, Cloud Security Specialists Robert Myles consults with strategic accounts, state and local government and federal government professionals across North America, advising on strategies for security architecture, technology, information and cybersecurity. His documented expertise comes from over 30 years of experience—including a previous 12-year career as a Chief Information Security Officer—within academia, financial services, healthcare and manufacturing. Known for his ability to relate conceptually as well as technically, Robert is a retired commissioned officer from the U.S. Coast Guard. He holds certifications as both a Certified Information System Security Professional (CISSP) and as a Certified Information Security Manager (CISM).
Brian Farneth has been with the Proofpoint Security Awareness team for over three years and came to Proofpoint via the acquisition of Wombat. Brian began his career at Proofpoint as a Customer Success Manager (CSM), and is now a Security Awareness Training Specialist supporting the SLED South Central team. Brian is based in Proofpoint's Pittsburgh, Pennsylvania office.
This event is suitable for Proofpoint customers who are responsible for protecting sensitive data, regulatory compliance, addressing evolving threats, improving/automating security operations, addressing cloud-related security issues, and improving the ability to analyze security data and detect attacks in real time.
NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or similar ISPs are not accepted.
This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.