Virtual Meeting

Zoom Meeting | Tuesday, September 15, 2020 | 10:00AM-11:30AM CT

Join your fellow Proofpoint users at the virtual Tennessee, Alabama, and Mississippi Proofpoint User Group!

This interactive meeting will bring together local Proofpoint users, threat researchers, and product experts to review the current threat landscape and product updates from Proofpoint. You’ll have the opportunity to hear from your peers on how they are leveraging Proofpoint and discuss your security-related questions with technical experts to help you optimize your investment in Proofpoint technologies.

  • Product Roadmap: The New Blueprint with Proofpoint
  • Product Updates: Protection, Targeted Attack Protection, Threat Response Auto-Pull, Security Awareness Training
  • Best Practices: Tips and Tricks, including “Taming your Whitelist"
  • A Customer’s Perspective: Exterran and Trico Electric Cooperative

We’ll have a special whiteboard artist from Idea Machine Studio live sketching during the two customer presentations. As a thank you, each attendee will receive a $50 Uber Eats gift card*.


This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.

NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

*If you cannot accept or wish not to accept the $50 Uber Eats gift card, please make sure to decline upon registering


Welcome & Introductions
Product Roadmap: The New Blueprint with Proofpoint
Product Updates: Protection, TAP, TRAP and PSAT
Best Practices: Tips and Tricks, including “Taming your Whitelist"
Live Whiteboard Sketching: A Customer’s Perspective

Who Should Attend

This event is suitable for Proofpoint customers who are responsible for protecting sensitive data, regulatory compliance, addressing evolving threats, improving/automating security operations, addressing cloud-related security issues, and improving the ability to analyze security data and detect attacks in real time.

© 2020 All Rights Reserved. Privacy Policy