Proofpoint

Virtual Meeting


Zoom Meeting | Tuesday, August 25, 2020 | 2:00PM-3:30PM CT

Join your fellow Proofpoint users at the virtual Tennessee, Alabama, and Mississippi Proofpoint User Group!

This interactive meeting will bring together local Proofpoint users, threat researchers, and product experts to review the current threat landscape and product updates from Proofpoint. You’ll have the opportunity to hear from your peers on how they are leveraging Proofpoint and discuss your security-related questions with technical experts to help you optimize your investment in Proofpoint technologies.

  • Product Roadmap: The New Blueprint with Proofpoint
  • Product Updates: Protection, Targeted Attack Protection, Threat Response Auto-Pull, Security Awareness Training
  • Best Practices: Tips and Tricks, including “Taming your Whitelist"
  • A Customer’s Perspective: DCH Regional Medical System and Alabama Farmers Cooperative Customer Presenters

We’ll have a special whiteboard artist from Idea Machine Studio live sketching during the two customer presentations. As a thank you, each attendee will receive a $50 Uber Eats gift card*.

uber-eats-logo.png

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks. www.isc2.org

NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

*If you cannot accept or wish not to accept the $50 Uber Eats gift card, please make sure to decline upon registering

Agenda

2:00PM-2:05PM
Welcome & Introductions
2:05PM-2:25PM
Product Roadmap: The New Blueprint with Proofpoint
2:25PM-2:45PM
Product Updates: Protection, TAP, TRAP and PSAT
2:45PM-3:05PM
Best Practices: Tips and Tricks, including “Taming your Whitelist"
3:05PM-3:25PM
Live Whiteboard Sketching: A Customer’s Perspective
3:25PM-3:30PM
Q&A

Who Should Attend

This event is suitable for Proofpoint customers who are responsible for protecting sensitive data, regulatory compliance, addressing evolving threats, improving/automating security operations, addressing cloud-related security issues, and improving the ability to analyze security data and detect attacks in real time.

© 2020 All Rights Reserved. Privacy Policy