Death by Chocolate

This event has already taken place. Please visit proofpoint.com/events for upcoming events near you.


Women Who Cyber brings together a diverse group of aspiring and thriving cybersecurity professionals for dynamic and interactive events where they can network with peers, establish meaningful mentoring relationships, share knowledge, and enjoy unique experiences.

You’ll learn from, and be inspired by, our panel of influential women as they discuss how they broke through the glass ceiling and continue to pave the way for women to lead and excel in the industry. They’ll also discuss the unique challenges women face, as well as the importance of diversity and gender equality in the workplace.

Learn and be inspired as our panel of influential women discuss:

  • How women are reshaping the industry
  • How women can grow and enhance their career
  • The importance of interpersonal skills, including leadership skills and emotional intelligence
  • How to engage and encourage the younger generation

Death by Chocolate
After the discussion, explore your creative side with a chocolate truffle workshop hosted by a local chocolatier, Dallas Chocolates. You'll be able to take home beautiful truffles created entirely by you and learn tips and tricks to make the perfect sweet treat! Prosecco, Rose and hors d'oeuvre will be served throughout the event.

Register now to support women in changing the face of cybersecurity!

Agenda

  • 3:30PM-3:45PM
    Registration and Welcome
  • 3:45PM-4:45PM
    Women Who Cyber Panel Discussion & Happy Hour
  • 4:45PM-6:00PM
    Chocolate Truffle Workshop

Featured Panelists

Karen Letain
Karen Letain | VP, Product Management, Proofpoint, Inc.

Karen leads the Product UX and Content teams for Proofpoint’s Security Awareness Division. Prior to Proofpoint, Karen was Head of Global Strategy and Innovation for McAfee’s Consumer Division leading the innovation product management, design and strategy teams. She was instrumental in launching a new 3-year strategy focused on moving the organization beyond antivirus to privacy and personal protection. Karen also drove the innovation teams to producing and delivering new performance enhancements in McAfee’ consumer products. Karen was also influential in managing McAfee Consumer’s M&A efforts resulting in the successful purchase of a 40M technology company to help accelerate the roadmap toward personal protection. Karen has also founded and led a number of start-ups in both Cybersecurity and Marketing and was VP of Operations for Thomson Learning the learning arm of Thomson Publishing (now CENGAGE). An active learner, Karen holds a number of degrees and designations. When not working or studying, she spends her time with her husband Claude, 2 children Gabrielle and Dominic and a very large furry 4-legged golden doodle.

Cheryl Tang
Cheryl Tang | Sr. Director, Product Marketing, Proofpoint, Inc.

Cheryl Tang leads product marketing for Core Email Security solutions at Proofpoint. She brings over 20 years of product marketing experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product marketing and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.

Lisa Wallace
Lisa Wallace | Southeast Regional Sales Director, Proofpoint, Inc.

Lisa Wallace is currently serving in the role of Regional Sales Director, supporting the Southeast, for Proofpoint. She has more than 20 years of experience as an Information Security Leader, Sales Consultant, and Privacy & Risk Management Professional. Lisa has served in sales and leadership positions within a variety of technology companies, ranging from small startups to the Fortune 1000. Her primary focus is on emerging technology issues and privacy concerns for organizations. Lisa enjoys developing people and programs, public speaking, and serving as a thought leader for security and privacy. Throughout her career, Lisa has served as a liaison between business and technical teams where she employed strategic and tactical insights to plan multiple steps ahead, oversee outcomes and ultimately provide the best solution to team members, customers, and partners, while combining key elements from the information security, privacy, and IT risk management fields. She is a team player with an open and direct style of communication who uses humor, listening skills, broad knowledge, and interests to create a pleasant and productive working environment.

Who Should Attend

While we are dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity, we welcome everyone - all genders, identities, and generations!

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). This event is not open to channel or technology partners.

Government and public sector employees are reminded to ensure that their acceptance and participation are permitted by applicable rules and regulations.

NOTE: Registration requires a valid email address from your organization’s domain, so Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted. Yahoo or any other ISP are not accepted.