• Days
  • Hours
  • Minutes
  • Seconds

The event has already taken place, thanks for checking!

Aired on Wednesday, April 24, 2024
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

Behind the Scenes with Threat Research


One of the most common questions we get is “what does a day in the life of a cyber threat researcher look like?” Here’s your chance to find out directly from the team that goes toe-to-toe with threat actors every day. Learn how our researchers discover and disrupt cyberattacks, analyze threat actors and campaigns, and deliver industry-leading threat intelligence for human-centric security that protects customers and the wider cybersecurity community.

The Proofpoint Threat Research team comprises industry experts covering everything in the threat landscape—from BEC to MFA phish kits to novel malware loaders to QR-code phishing.

Join this Power Series as we discuss:

  • Threats that keep us up at night
  • Career paths to cybersecurity
  • What does Proofpoint do with our research?
  • Surprises from the threat landscape


Get Your Power Series Gift!

After the event, we’ll be giving away a Powerstick Minuet Portable Speaker* to the first 1,000 qualified attendees who claim their gift in the U.S. and to the first 150 in Canada.





Rutrun Vehicula Fermentum Lacinia Enim

Host

Ryan Kalember
Ryan Kalember | Chief Strategy Officer, Proofpoint, Inc.

With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

Featured Panelists

Daniel Blackford
Daniel Blackford | Sr. Manager, Threat Research, Proofpoint, Inc.

Formerly a researcher himself, Daniel currently leads Proofpoint's threat research team devoted to tracking financially-motivated actors. From high-profile botnets to credential harvesting and business email compromise, Daniel's team is in the weeds everyday leveraging Proofpoint's world class visibility to make high-confidence attributions and to share their findings with defenders across the world. Prior to his work at Proofpoint, Daniel worked as a malware analyst at the NCFTA and got his start tracking adversaries as a combat engineer with the US Army.


Alexis Dorais-Joncas
Alexis Dorais-Joncas | Sr. Manager, Threat Research, Proofpoint, Inc.

Alexis Dorais-Joncas is the Senior Manager of Proofpoint’s APT research team, where he and his team of threat researchers and intelligence analysts focus on tracking the most elusive state-sponsored threat actors and ensuring Proofpoint customers are protected against these persistent attackers. Prior to joining Proofpoint, Alexis led ESET’s Montreal-based R&D branch office for over 10 years, where his team focused on malware research, network security and targeted attacks tracking. Alexis is an established speaker on current cyberthreats, having spoken in front of diverse audiences at events such as Northsec, Bluehat, Botconf, First CTI, Sector and Rightscon. He has also been quoted in several security and technical media such as Wired, ITWorldCanada and Ars Technica, with broadcast appearances on Radio-Canada and Skynews. Alexis holds an M. Sc. in Electrical Engineering from the University of Sherbrooke in Canada.


Sarah Sabotka
Sarah Sabotka | Sr. Threat Researcher, Proofpoint, Inc.

Sarah Sabotka is a Senior Threat Researcher on the Threat Research Team at Proofpoint where she focuses on commodity crimeware campaigns and communicating the threat landscape to customers and the public. Sarah had her start by doing OSINT collection, case development, and law enforcement collaboration to support animal cruelty investigations for an international animal welfare organization. Prior to joining Proofpoint, Sarah spent over four years developing and leading the Global Cyber Threat Intelligence team at Experian, where she was also responsible for leading brand monitoring, threat hunting, vulnerability intelligence, and ad-hoc incident response activities; before that she was a Senior Threat Analyst at Goldman Sachs. Sarah earned her B.A. in English from the University of Connecticut (Storrs), and her M.S. in Cybersecurity from Utica College. She resides in southern New Hampshire where she runs a 501(c)3 animal rescue and sanctuary with her husband, home to 14 rescue dogs and four rescue fish.




Aired on Wednesday, May 22, 2024
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

The Human-Centric Security Imperative


At Proofpoint, we’ve long championed human-centric cybersecurity as a critical priority for infosec teams. As traditional security controls struggle more than ever with modern threats, the broader industry is finally coming around to the idea. But what does human-centric security look like in practice? In this session, we’ll explore the ins-and-outs of putting people at the center of your cyber defenses. Hear about the four principal categories of human-based risks—threats, impersonation, identity and data loss—and the best approach for proactively addressing each holistically.

Join this Power Series as our panel of experts discuss:

  • Why human-centric security is a game-changer for security teams
  • How and where to deploy AI most effectively
  • The surprising synergies between threat protection and DLP

Get Your Power Series Gift!

After the event, we’ll be giving away a IPrintIt Portable Wireless Phone Printer* to the first 1,000 qualified attendees who claim their gift in the U.S. and to the first 150 in Canada.



Rutrun Vehicula Fermentum Lacinia Enim

Host

Chris Danyo
Chris Danyo | SVP, Americas Sales, Proofpoint, Inc.

Chris Danyo is Senior Vice President of Sales for the Americas Theater at Proofpoint. Chris previously served as Vice President of Named Accounts for the Americas, where he successfully led Proofpoint's largest single segment. Chris has over 20 years of progressive sales leadership experience in the cybersecurity space. Before joining Proofpoint, Chris was at Hewlett Packard Enterprise (HPE) and Symantec in roles of increasing seniority and responsibility.

Featured Panelists

Nate Chessin
Nate Chessin | SVP, Worldwide Sales Engineering, Proofpoint, Inc.

Nate Chessin is a 20 year technology and sales professional with extensive leadership and technical sales experience. Prior to Proofpoint, Nate held various leaderships positions at Cisco Systems and Glue Networks delivering Software Defined Networking, Collaboration, Security, Mobility and Service Provider architectures. Nate holds a BA in Computer Science from Pomona College in Southern California and is CCIE #12034.


Cat Hwang
Cat Hwang | Sr. Director, Product Marketing, Proofpoint, Inc.

Catherine Hwang is a Sr. Director of Product Marketing at Proofpoint, where she drives product marketing strategy for cloud app security, information protection, and compliance. Hwang has been with Proofpoint for over 3 years. Prior to joining Proofpoint, she has held a variety of strategic and technical roles at companies such as McAfee and Mercury (acquired by Hewlett-Packard). Hwang has a degree in Computer Engineering degree from the University of Michigan.


Cheryl Tang
Cheryl Tang | Sr. Director, Product Marketing, Proofpoint, Inc.

Cheryl Tang leads product marketing for Core Email Security solutions at Proofpoint. She brings over 20 years of product marketing experience in the enterprise security and IT market. Prior to Proofpoint, Tang has served in product marketing and leadership roles at Imperva, Centrify, Symantec, Good Technology, and WebEx Communications. She earned a Bachelor of Arts degree in Economics from the University of California, Berkeley.


Jasmine Wu
Jasmine Wu | Senior Director, Product Marketing & Head of GTM Operations, Proofpoint, Inc.

Jasmine Wu is the Senior Director of Product Marketing and Head of GTM Operations at Proofpoint. She has over 15+ years of experience providing thought leadership and advisory in the emerging technologies space, including cloud collaboration, corporate risk protection, information governance, and digital transformation.

Zoom | Wednesday, June 12, 2024
1-2PM ET | 12-1PM CT | 11-12PM MT | 10-11AM PT - Americas

Defending Data in the Age of AI


Generative AI presents a clear opportunity to accelerate innovation. According to the McKinsey Global Survey, 25% of C-suite executives are personally using GenAI tools for work.

In this session, our experts will explore how to enable safe adoption of GenAI and how it is already driving the use of AI tools in data loss prevention.

Join this Power Series as our panel of experts discuss:

  • How GenAI is used and presents risk to data
  • How to monitor and control the use of GenAI
  • How AI tools can help you defend your data

Get Your Power Series Gift!

After the event, we’ll be giving away an DuoTalk Wireless Microphone* to the first 1,000 qualified attendees who claim their gift in the U.S. and to the first 150 in Canada.





Rutrun Vehicula Fermentum Lacinia Enim

Host

Brian Reed
Brian Reed | Sr. Director, Cybersecurity Strategy, Proofpoint, Inc.

Brian Reed is Sr. Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.

Featured Panelists

Itir Clarke
Itir Clarke | Staff Product Marketing Manager, Proofpoint, Inc.

Itir Clarke is a Staff Product Marketing Manager for Proofpoint's Cloud App Security solutions. Before coming to Proofpoint, Itir worked with data center products at Cisco, Brocade and Sun Microsystems before that. Itir has over 20 years of information technology experience in Product Marketing and Management roles.



Joshua Linkenhoker
Joshua Linkenhoker | Field Security Architect, Proofpoint, Inc.

Josh is a leader in the Information Protection space that works with organizations to build comprehensive Information Protection programs. He is an experienced enterprise leader having held multiple director roles (Fortune 500) focusing on Information Protection, Cloud Security, and Email Security. At Proofpoint, Josh leads and educates both staff and clients on the Information Protection space, being an active participant in Proofpoint research, internal enablement, and speaking opportunities related to ITM and DLP.



Isabella DeLucia
Isabella DeLucia | Manager, Global Data Threat Analysis, Crane

Isabella DeLucia designed, implemented, and now manages an Insider Threat program within Crane Company, a global diversified manufacturing conglomerate. Her past investigative experience accompanied by an educational background in forensic psychology brings a unique perspective to managing Insider Threats cross-functionally. Isabella is particularly passionate about building security culture with a human-centric approach. Prior to working in Insider Threat, Isabella specialized in supply chain security investigations and intelligence analysis. She holds multiple Insider Threat and related industry certifications, and degrees from the University of New Haven in Psychology and Criminal Justice.


(ISC)2 CPE Logo

Earn Cybersecurity CPE Credits - ISC2

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.

Who Should Attend

This event is suitable for information security decision-makers, including CXOs, VP of IT, Director of IT, as well as mid-level information security management professionals (Senior Security Manager, IT Security Manager, IT Manager), and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst). It is also relevant for Proofpoint Channel Partner representatives.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.



Terms and Conditions

*Offer subject to availability. These gifts are a $25 value. Please see above for details on what the specific gifts are. Gift is not contingent upon agreeing to do business with Proofpoint, Inc. By accepting this gift you represent and warrant that (1) you are not a representative, employee or contractor of any national, federal, provincial, state, municipal or other government, governmental agency, or quasi-governmental entity (“Government User”), (2) you are not related to any person who is a representative, employee or contractor of a Government User, and (3) your acceptance of this gift does not violate your employer’s code of conduct or similar policies, and you have notified your employer of this offer and your employer has consented to you accepting this offer.

**Qualified attendees include information security decision-makers: CXOs, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager); and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst) from enterprises and organizations, as well as Proofpoint Channel Partner representatives within the US and Canada. This gift is not available to independent consultants or technology partners.