Threat Review &

Predictions 2021

Zoom | Tuesday, January 19, 2021 | 1:00PM-2:00PM ET

2020 was a turbulent year in many ways—and that includes cybersecurity. New threats and tactics are always emerging, but attack surfaces changed dramatically as organizations worldwide were forced to shift to a remote workforce model. This rendered traditional network-based security technologies ineffective. We saw new, high-profile breaches that demonstrated that there was a gap in security. This showed everyone that a proactive approach was needed.

Join Paul Wang, Proofpoint Threat Analyst, to review 2020 threats and discuss 2021 predictions. We’ll highlight:

  • Trends we saw in 2020 and what we anticipate in 2021
  • The industry verticals we anticipate will be targeted
  • The techniques and tactics that will be used by threat actors

As a thank you, each qualified attendee will receive a $50 Uber Eats gift card.*
2019 CPE-Submitter logo  (1).png
Earn CPE Credits
This event is approved and endorsed by (ISC)². CPE credits will automatically be credited to your member account within four to six weeks.

*If you cannot accept or wish not to accept the $50 Uber Eats gift card, please decline upon registering.


Welcome and Introductions
Threat Discussion

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.

Featured Speaker

Paul Wang, Threat Analyst, Proofpoint, Inc.

Paul Wang is a Threat Analyst at Proofpoint with experience both in computer network defense as well as malware analysis. He comes from a background of signature development and enterprise analytics. Wang specializes in performing digital examinations in support of intrusions, criminal investigations and intelligence management for high profile companies and federal networks. He has contributed to many published whitepapers and continues to help organizations protect the safety of their users.
© 2021 All Rights Reserved. Privacy Policy