Solving the Cybersecurity Skills Gap

Zoom | Tuesday, May 3, 2022 | 1:00PM-1:30PM ET


Gone are the days when highly skilled information security employees were plentiful and technologies were effective in silos. The modern threat landscape is dynamic and the cybersecurity skills shortage has reached historic levels. As technologies advance, the skills necessary to maximize them become more specialized. In many cases there are two job openings for every specialist.

Proofpoint is invested in ensuring the success of our customers by providing a range of services to complement our products. People-Centric Managed Services (PCMS) is the newest services line designed to provide on-demand expertise for Proofpoint solutions and selected third party technologies, delivered in a Managed Services model.

Join us for this virtual event and learn how PCMS can maximize your security investments while reducing the financial and operational risks associated with the cybersecurity skills gap.

During this Tech Talk, you’ll learn:

  • What PCMS accomplishes for today’s business
  • The problems PCMS solves for customers
  • The results PCMS customers realize

Proofpoint Tech Talks are 30-minute technical discussions brought to you by engineers, for engineers. They cover a range of topics and feature technical deep dives, demos, customer stories, and live Q&A with Proofpoint experts.


Rocketbook

Get Your Tech Talk Gadget!

Each attendee will have the option to order their own complimentary Tech Talk Gadget after the event. This month's gadget is a Rocketbook Mini Notebook Set. Tech Talk Gadgets are only available to qualified attendees in the U.S. or Canada.




Featured Speaker

Jeremy Wittkop
Jeremy Wittkop | Sr. Director, Technology Services, PCMS, Proofpoint, Inc.

Jeremy Wittkop is Proofpoint’s Senior Director of Technology Services for the People-Centric Managed Services group. As InteliSecure’s former Chief Technology Officer, Jeremy was a foundational architect for InteliSecure’s internationally recognized Data Protection, Cloud Security, and User and Entity Behavior Analytics Services. Jeremy is a trusted data protection thought leader -- published author, blogger, public speaker, and advisor to clients and formerly public and private equity investors.

Who Should Attend

This event is suitable for mid-level information security management (IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.