two people
Agenda and Speakers
Agenda

Straight talk and insight from industry titans

Join us for a forward-looking itinerary packed with the learnings and networking you'll need to stay ahead.

Agenda
What's on

Tailor your agenda with transformative connections and learning

Day 1
Day 2
Day 3
7:00 AM - 6:00 PM

Registration

Add to calendar
9:00 AM - 4:00 PM

Certification Labs & Exams

Add to calendar
9:00 AM - 4:00 PM

Proofpoint Protect Labs

Add to calendar
1:00 PM - 4:00 PM

Executive Meetings at Proofpoint Protect 2025

Add to calendar
1:00 PM - 4:00 PM

Global Partner Summit

Add to calendar
2:00 PM - 4:00 PM

Proofpoint’s Women Who Cyber & AWS presents: Influence - Above and Beyond

Add to calendar
4:00 PM - 6:00 PM

Welcome Reception

Add to calendar
7:00 AM - 9:00 AM
7:00 AM - 9:00 AM

First-Timer Breakfast

Add to calendar
7:00 AM - 6:30 PM

Registration

Add to calendar
7:00 AM - 9:00 AM
9:00 AM - 10:05 AM

Opening Keynote: The Next Chapter - Human-Centric, AI-Driven Security

Add to calendar
10:15 AM - 10:50 AM

CISO Panel: Human-Centric Leadership in an AI-Driven Threat Landscape

Add to calendar
10:50 AM - 12:00 PM

Roadmap Session: From Vision to Reality - The Proofpoint Platform Roadmap

Add to calendar
12:00 PM - 1:00 PM
12:00 PM - 5:00 PM

Certification Labs & Exams

Add to calendar
12:00 PM - 5:00 PM

Proofpoint Protect Labs

Add to calendar
12:00 PM - 5:00 PM
1:00 PM - 3:45 PM

Breakouts

Maximize: Email Protection
Stop: Human-centric Threats
Transform: Data Security
Empower: Behavior and Culture
Spotlight Theater
1:00 PM - 1:30 PM
Building a High-Efficiency Email SOC: Lessons from the Field

Too many security teams are stuck in reactive mode when responding to email threats. Some Proofpoint customers are charting a different course.

1:35 PM - 2:05 PM
Streamlining SOC Operations with Agentic AI: Roadmap

Agentic AI is reshaping how products think, act, and deliver value.

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM
Proofpoint Protection in an M365-First World: Data That Drives the Decision.

Lightning Talk 1: Building the Business Case: A Customer's Perspective

2:45 PM - 2:55 PM
Proofpoint Protection in an M365-First World: Data That Drives the Decision

Lightning Talk 2: Operational Evidence that Drives the Decision

2:55 PM - 3:05 PM
Proofpoint Protection in an M365-First World: Data That Drives the Decision

Lightning Talk 3: Finding the RIght Fit - SEG or API?

3:10 PM - 3:20 PM
Revolutionizing Your SOC Investigations with Threat Protection Workbench

Lightning Talk 1: Smarter, faster investigations—powered by AI and built for analysts

3:20 PM - 3:30 PM
Revolutionizing Your SOC Investigations with Threat Protection Workbench

Lightning Talk 2: Remediation -Seamlessly manage blocklists, safelists, URLs, and hashes to stop threats at scale.

3:30 PM - 3:40 PM
Revolutionizing Your SOC Investigations with Threat Protection Workbench

Lightning Talk 3: SOC success stories— responding with speed, clarity, and control

1:00 PM - 1:30 PM
Reducing Risk and Taming Complexity with an Integrated Platform

More tools often mean more complexity—and more risk.

1:35 PM - 2:05 PM
Defend Against Two Sides of Account Compromise

As the digital workspace expands, account compromise is becoming increasingly inevitable.

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM
Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Lightning Talk 1: The DMARC Journey

2:45 PM - 2:55 PM
Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Lightning Talk 2: Protecting Application-Generated Email

2:55 PM - 3:05 PM
Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Lightning Talk 3: Leverage Domain Takedown Services

3:10 PM - 3:20 PM
From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Lightning Talk 1: Pre-Account Takeover

3:20 PM - 3:30 PM
From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Lightning Talk 2: Phishing in Action

3:30 PM - 3:40 PM
From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Lightning Talk 3: Post-Account Takeover

1:00 PM - 1:30 PM
Making Unified Data Security a Reality with Proofpoint

As defenders of your organization’s data, you know how disconnected tools and manual processes can make it challenging to secure your sensitive information.

1:35 PM - 2:05 PM
Stop Insider Risks Before They Become Headlines

Most organizations address insider risk only after the damage has been done.

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM
Proofpoint Data Security Innovations You Shouldn't Miss

Lightning Talk 1: Human Risk Explorer and Dynamic Endpoint Policies

2:45 PM - 2:55 PM
Proofpoint Data Security Innovations You Shouldn't Miss

Lightning Talk 2: Nexus File Lineage

2:55 PM - 3:05 PM
Proofpoint Data Security Innovations You Shouldn't Miss

Lightning Talk 3: Advanced Detectors at the Endpoint

3:10 PM - 3:20 PM
Proofpoint for Proofpoint: Securing Enterprise AI

Lightning Talk 1: Secure AI Platform Configurations

3:20 PM - 3:30 PM
Proofpoint for Proofpoint: Securing Enterprise AI

Lightning Talk 2: Granular Data Access Enforcement

3:30 PM - 3:40 PM
Proofpoint for Proofpoint: Securing Enterprise AI

Lightning Talk 3: Safe Agent and Workflow Development

1:00 PM - 1:30 PM
Proving It Works: How to Effectively Measure Security Behavior Change

This session explores how to effectively measure security behavior change at both the operational and strategic levels.

1:35 PM - 2:05 PM
Fusing Threat Intelligence with Targeted Risk Education

As AI empowers attackers to craft more convincing phishing lures at scale, traditional training methods are no longer enough.

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM
Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

Lightning Talk 1: Identifying Cultural Influences

2:45 PM - 2:55 PM
Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

Lightning Talk 2: Building Your Advocate Network

2:55 PM - 3:05 PM
Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

Lightning Talk 3: Elevating Everyday Engagement

3:10 PM - 3:20 PM
Security Culture in the Real World: Stories That Inspire Action

Lightning Talk 1: From Simulation to Education - Tailored Learning in Action

3:20 PM - 3:30 PM
Security Culture in the Real World: Stories That Inspire Action

Lightning Talk 2: Introducing the Cybersecurity Personality Assessment

3:30 PM - 3:40 PM
Security Culture in the Real World: Stories That Inspire Action

Lightning Talk 3: The "Game" of Shaping Behavior Change

4:00 PM - 5:00 PM
Welcome to the Endgame

Get a behind-the-scenes look at one of the most ambitious cybercrime takedowns in recent history.

1:00 PM - 4:00 PM

Executive Meetings at Proofpoint Protect 2025

Add to calendar
4:00 PM - 5:00 PM

Guest Speaker - To be announced

Add to calendar
5:30 PM - 6:00 PM

Travel to Nashville Nights

Add to calendar
6:00 PM - 9:00 PM

Nashville Nights at Proofpoint Protect 2025

Add to calendar
7:00 AM - 9:00 AM
7:00 AM - 3:00 PM

Registration

Add to calendar
9:00 AM - 10:30 AM
Power Series Live! Navigating the Ever-Evolving Threat Landscape

With trillions of email and cloud-based attacks occurring annually, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.

Add to calendar
10:30 AM - 10:45 AM

Break

10:45 AM - 1:40 PM

Certification Labs & Exams

Add to calendar
10:45 AM - 1:40 PM

Executive Meetings at Proofpoint Protect 2025

Add to calendar
10:45 AM - 1:40 PM

Proofpoint Protect Labs

Add to calendar
10:30 AM - 1:45 PM
10:45 AM - 1:40 PM

Breakouts

Maximize: Email Protection
Stop: Human-centric Threats
Transform: Data Security
Empower: Behavior and Culture
10:45 AM - 11:15 AM
Maximize the Full Potential of Core Email Protection

Misconfigurations in email security setups can quietly create gaps that attackers exploit—especially in Microsoft 365 and hybrid environments.

11:20 AM - 11:50 AM
Inside Nexus: How Proofpoint Uses AI to Stop Email Threats

Get an inside look at the AI-powered defenses built into Proofpoint products.

12:35 PM - 12:45 PM
2025 in Email Threats: What Hit, What Hurt, What’s Next

Lightning Talk 1: What Hit - Social Engineering at Scale

12:45 PM - 12:55 PM
2025 in Email Threats: What Hit, What Hurt, What’s Next

Lightning Talk 2: What Hurt - Exploiting Trust with Legitimate Tools

12:55 PM - 1:05 PM
2025 in Email Threats: What Hit, What Hurt, What’s Next

Lightning Talk 3: What's Next - Future-Proofing Against 2026 Threats

1:10 PM - 1:20 PM
BEC 3.0: AI and the Next $1 Billion Fraud

Lightning Talk 1: BEC Seen in the Wild

1:20 PM - 1:30 PM
BEC 3.0: AI and the Next $1 Billion Fraud

Lightning Talk 2: BEC by the Numbers - Data Trends and AI Tactics

1:30 PM - 1:40 PM
BEC 3.0: AI and the Next $1 Billion Fraud

Lightning Talk 3: Staying Smarter than the Latest BEC Scams

10:45 AM - 11:15 AM
From Email to Everywhere: Stopping Threats Across Digital Channels

While email remains the primary threat vector, attackers are increasingly exploiting digital channels like Teams, Slack, and Zoom to target users.

11:20 AM - 11:50 AM
Improving Email Deliverability: From Users to Applications

Organizations today rely heavily on email—whether sent by users or applications, hosted in the cloud or on-premises.

12:35 PM - 12:45 PM
Email Authentication: What the Future Holds

Lightning Talk 1: What You Need to Know About DMARCbis

12:45 PM - 12:55 PM
Email Authentication: What the Future Holds

Lightning Talk 2: Emerging DKIM2 Standards Discussion

12:55 PM - 1:05 PM
Email Authentication: What the Future Holds

Lightning Talk 3: Changes in Email Receiver Landscape

1:10 PM - 1:20 PM
Building a Strong SaaS Security Posture with Proofpoint

Lightning Talk 1: Bring Unsanctioned SaaS and identities Out of the Shadows

1:20 PM - 1:30 PM
Building a Strong SaaS Security Posture with Proofpoint

Lightning Talk 2: Fortify the Posture of Your Enterprise SaaS Applications

1:30 PM - 1:40 PM
Building a Strong SaaS Security Posture with Proofpoint

Lightning Talk 3: Strengthening SaaS security posture: A real-life example

10:45 AM - 11:15 AM
Time to Shift to Modern Human-Centric DLP

Now is the time to shift to modern, human-centric DLP.

11:20 AM - 11:50 AM
Guardrails for GenAI: A Data Security Playbook

GenAI tools, such as ChatGPT and Microsoft Copilot, are accelerating productivity and innovation, but not without risk.

12:35 PM - 12:45 PM
Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Lightning Talk 1: Snowflake Data Access Governance

12:45 PM - 12:55 PM
Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Lightning Talk 2: Abandoned Data Discovery

12:55 PM - 1:05 PM
Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Lightning Talk 3: Data Classification for Cloud Data Stores

1:10 PM - 1:20 PM
Mastering a Hybrid Approach to Email DLP

Lightning Talk 1: The Anatomy of Email Data Exfiltration

1:20 PM - 1:30 PM
Mastering a Hybrid Approach to Email DLP

Lightning Talk 2: Key Benefits of a Comprehensive Approach to Email DLP

1:30 PM - 1:40 PM
Mastering a Hybrid Approach to Email DLP

Lightning Talk 3: Prescriptive Guide to Hybrid Email DLP

10:45 AM - 11:15 AM
A Roadmap for Human Risk Resilience via Insight, Automation & Contextual Learning

Get visibility into Proofpoint Human-centric security roadmap highlighting the use of AI, automated workflows, and integrations between Human Risk Explorer and ZenGuide.

11:20 AM - 11:50 AM
Operationalizing Human Risk Data to Drive Behavior Change

What does it mean to be a high-risk user?

12:35 PM - 12:45 PM
From Awareness to Action with Proofpoint's Maturity Model

Lightning Talk 1: Why Awareness Training Falls Short - and What Comes Next

12:45 PM - 12:55 PM
From Awareness to Action with Proofpoint's Maturity Model

Lightning Talk 2: The Science Behind Behavior Change in Cybersecurity Learning

12:55 PM - 1:05 PM
From Awareness to Action with Proofpoint's Maturity Model

Lightning Talk 3: Applying the Human Risk Management Maturity Model (MRM-MM)

1:10 PM - 1:20 PM
Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Lightning Talk 1: AI-Driven Security Content Creation and Curation

1:20 PM - 1:30 PM
Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Lightning Talk 2: GenAI Phish Hooks and Teachable Moments

1:30 PM - 1:40 PM
Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Lightning Talk 3: Automated Risk-based Learning

11:50 AM - 12:35 PM
1:45 PM - 2:30 PM

Catch Dr. Poppy Crum and Ryan Kalember in the Spotlight Theater - closing session!

Add to calendar

*subject to changes

Learning tracks
Dedicated content

Transform human risk into resilience

Powerful tracks designed to help you maximize your cybersecurity investment

Core tracks

Maximize: Email Protection

Explore the latest changes in the email threat landscape and how Proofpoint customers stay ahead of attackers. Grab your front-row seat to evolving best practices, and get a preview into our email protection innovation roadmap featuring agentic AI to power up your SOC.

Stop: Human-centric Threats

Discover how attackers execute sophisticated, multichannel, multistage attacks that extend beyond email. Secure your spot to explore effective security measures, new feature enhancements, and peer-driven best practices for stopping human-centric threats with a comprehensive defense.

Transform: Data Security

Data exfiltration, exposure, and insider threats put sensitive information at risk. Protecting your organization’s most valuable data across cloud, endpoint, and email is a human-centric challenge.

Empower: Secure Behavior and Culture

Empowering the people within your organization to be part of the security solution was once just a dream. Now it is reality. Discover the perfect balance between people and technology.

2025 Speakers
Featured speakers

Hear directly from the best in the business.
All in one place.

Dr. Poppy Crum

Dr. Poppy Crum

Expert in AI, Technology-Driven Innovation, & Human Evolution Futurist, Neuroscientist, and Technologist

Chris Inglis

Chris Inglis

Former U.S. National Cyber Director

Judy Molenaar

Judy Molenaar

VP, Information Security & Chief Information Security Officer, Surescripts

Who should attend
You belong here

Great defense requires elite defenders—like you. Protect 2025 serves:

Security Analysts and Engineers

Security Analysts and Engineers

System and Network Admins

Systems
 and Network Admins

Researchers and Threat Analysts

Researchers and Threat Analysts

CISOs and Security Leadership

CISOs and Security Leadership

From front-line defenders to strategic visionaries: Secure your future when learning about what's next.

Need help justifying your trip?
Download our business justification letter as a template for your business case.

Proofpoint Protect Labs

Location: Magnolia Mezzanine 2 - 4

Format: Interactive, self-paced cybersecurity training 

No instructors. No scheduling. Just hands-on learning.

Choose Your Track

Threat Protection

Outsmart attackers with real-world phishing, BEC, and ransomware scenarios. Learn to operationalize and respond to live attack simulations. 

Data Security

Protect sensitive data across email, cloud, and endpoints. Detect insider threats, align with compliance, and gain practical DLP and insider risk skills.

Why Join? 

Gamified learning: points, leaderboards, and prizes

Exclusive challenge coins for early participants 

Flexible, on-demand format--learn at your own pace

Lab Hours

Monday: 9:00 AM - 4:00 PM

Tuesday: 12:00 PM - 5:00 PM

Wednesday: 10:45 AM - 1:40 PM

Ready to level up your security skills?

Visit us at Proofpoint Protect Labs in Magnolia Mezzanine 2 - 4.


 


 

Protect 2025 | Day 1

Customer Meetings

Time: 1:00 PM - 4:00 PM

Meet with Proofpoint executives and product leaders. Share your priorities, get expert insights and practical guidance to help you reach your cyber security goals.

Protect is the perfect opportunity to engage in tailored discussions with Proofpoint executives and product leaders for insights into your data and winning strategies that intersect with your top security priorities. Connect with the people that can address your concerns and help you grow your business.

Meetings can be pre-scheduled via a member of your account team or scheduled on-site at the Meeting Center reception desk, pending meeting availability. Please reach out to your account representative today or email protect@proofpoint.com to learn more.

Global Partner Summit

Time: 1:00 PM - 4:00 PM

Calling all partners - don't miss out on your exclusive opportunity to connect with Proofpoint channel leaders, our executive team, and partner community as we align on strategy, innovation, and shared success. 

At Proofpoint, we're AI Driven.  Partner Empowered.  This Partner Summit is all about you - our partners - and the powerful role you play in protecting people and data around the world.  We can't wait to see you at Proofpoint Protect 2025!

Protect 2025 | Day 1

Proofpoint’s Women Who Cyber and AWS presents: Influence - Above and Beyond

Time: 2:00 PM - 4:00 PM

No matter your role, whether you're a practitioner, manager, or CISO, your ability to influence upward is a critical skill.  This hands-on workshop is designed for anyone looking to strengthen their executive communication and drive meaningful change at levels above their own.

From making the case for resources to shaping strategic decisions, how you deliver your message can be just as important as what you say.  In this interactive session, you'll hear from security and business leaders who've navigated high-stakes conversations and learn how to craft messages that resonate with diverse leadership audiences, technical or not.  

Join peers from across the industry to explore what works (and what doesn't) when communicating across the leadership spectrum.  You'll leave with practical tools to evaluate your presence, manage tough questions with confidence, and lead with influence - wherever you are in your career.

This session is open to all participants ready to lead from where they stand, regardless of title, background, or gender identity. 

 

Protect 2025 | Day 1

Welcome Reception

Time: 4:00 PM - 6:00 PM

Kick off your Proofpoint Protect 2025 experience at our Welcome Reception—an evening designed to spark connection, conversation, and community. Hosted by Proofpoint, this relaxed networking event brings together cybersecurity professionals, industry leaders, and fellow attendees for drinks, light bites, and great company. Whether you’re reconnecting with familiar faces or meeting peers for the first time, this is your chance to start the week on a high note. We can’t wait to welcome you!

Protect 2025 | Day 2

First-Timer Breakfast

Time: 7:00 AM - 9:00 AM

New to Proofpoint Protect? Join us during our First-Timer Breakfast on September 23—an exclusive event designed to welcome newcomers and kickstart your conference experience with confidence. This relaxed, informal gathering offers the perfect opportunity to connect with fellow first-time attendees, meet members of the Proofpoint team, and get insider tips on how to make the most of your time at Proofpoint Protect. You’ll gain a clear understanding of the agenda, learn how to navigate the event, and begin building meaningful connections before the conference is in full swing. Start your Proofpoint Protect journey with a warm welcome and a head start. We can’t wait to meet you!

Nexus Hub

Explore the Proofpoint Protect Nexus Hub

Step into the heart of the Protect experience at the Nexus Hub, your go-to destination for learning, networking, and hands-on engagement--all accessible through the Proofpoint Protect mobile app. 

What You'll Find at the Nexus Hub 

Theater Breakouts--Dive into focused sessions led by industry experts.

Spotlight Theater--Catch high-impact presentations on the latest cybersecurity innovations.

Meet the Experts--Connect one-on-one with Proofpoint specialists. 

Product Demos--Get hands-on with the latest tools and technologies.

Sponsor Booths--Discover solutions from our trusted partners.

Sustainability in Action--Learn how Proofpoint is making a difference.

Proofpoint FaceOff--Test your cybersecurity knowledge in a fun, competitive format. 

Breakfast/Lunch Room--Recharge and connect over meals in a dedicated space for breakfast and lunch service 

Nexus Hub Hours

Monday, September 22

4:00 PM - 6:00 PM

Tuesday, September 23 

7:00 AM - 9:00 AM

12:00 PM - 4:00 PM

Wednesday, September 24

10:30 AM - 1:45 PM

Whether you're looking to learn, connect or compete, the Nexus Hub is your launchpad for a dynamic Protect experience. Use the mobile app to navigate the space, schedule sessions, and track your engagement. 

Protect 2025 | Day 2

Opening Keynote

The Next Chapter: Human-Centric, AI-Driven Security

Time: 9:00 AM - 10:05 AM

Speaker: Sumit Dhawan, CEO

Join CEO Sumit Dhawan as he shares a bold vision for securing both the human and the digital human in today’s AI-driven world. Discover powerful new innovations in Proofpoint’s human-centric security platform, built to stop threats, protect data, and prepare organizations for what’s next. This is where the next chapter of Human-Centric, AI-Driven security begins.

Protect 2025 | Day 2

CISO Panel

Time: 10:15 AM - 10:50 AM

Speakers:

  • Blake Sallé, Chief Revenue Office, Proofpoint
  • Pat Joyce, Global Resident Chief Information Security Officer, Proofpoint
  • Kris Burkhardt, Chief Information Security Officer, Accenture
  • July Molenaar, VP, Information Security & Chief Information Security Officer, Surescripts
  • Brian Cincera, Chief Information Security Officer, Cargill

 

CISO Panel: Human-Centric Leadership in an AI-Driven Threat Landscape

Join Chief Revenue Officer Blake Sallé as he moderates a thought-provoking discussion with CISOs from across our customer community. This panel will dive into how security leaders are evolving their strategies in response to AI-driven threats, while remaining grounded in human-centric values. From empowering teams to making ethical AI decisions, hear how these CISOs are navigating the complex balance of innovation, trust, and resilience in a rapidly changing cyber landscape.

 

Roadmap Session 

Time: 10:50 AM - 12:00 PM

Speakers:

Dorothy Li, CVP, Security Copilot and Ecosystem, Microsoft

Mayank Choudhary, EVP & GM, Information Protection, Cloud Security & Compliance Products Group

Tom Corn, EVP & GM, Threat Protection Products Group

Roadmap Session: From Vision to Reality: The Proofpoint Platform Roadmap 

Building on the bold vision shared in "The Next Chapter: Human-Centric, AI-Driven Security", this session dives into the strategic roadmap that will bring that vision to life. Join Proofpoint product leaders as they unveil upcoming innovations across our human-centric security platform to stop threats and protect data. Learn what's coming next, how it aligns with your organization's needs, and how you can prepare to take full advantage of the future of cybersecurity. 

Protect 2025 | Day 2

Building a High-Efficiency Email SOC: Lessons from the Field

Time: 1:00 PM - 1:30 PM

Speaker(s): 

Chirag Patel, CISO, Bottomline Technologies

Jason Ford, Principal Sales Engineer, Proofpoint

Too many security teams are stuck in reactive mode when responding to email threats. Some Proofpoint customers are charting a different course. In this session, you’ll hear from security leaders who transformed their SOC by connecting Proofpoint with their broader SecOps ecosystem — including SIEM, SOAR, SASE, XDR, and identity tools — to enable faster triage, deeper correlation, and automated response. You’ll walk away with practical recommendations for building a more efficient email SOC.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Streamlining SOC Operations with Agentic AI: Roadmap

Time: 1:35 PM - 2:05 PM

Speaker(s): 

Dan Rapp, Chief AI and Data Officer, Proofpoint

Patrick Wheeler, Director, Product Management, Proofpoint

Agentic AI is reshaping how products think, act, and deliver value. In this breakout session, we’ll dive into our product roadmap and how we’re integrating agentic AI to drive smarter automation, proactive decision-making, and more intuitive user experiences. Get a first look at what’s coming next—and how it will unlock powerful new capabilities for you.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Protection in an M365-First World: Data That Drives the Decision

Time: 2:35 PM - 2:45 PM

Speaker(s): 

Nathan Dube, IT Security Manager, Viant Medical

Monica Gupta, Sr. Product Marketing Manager, Proofpoint

Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value and demonstrated how Proofpoint’s human-centric approach matters to the business.

Lightning Talk 1: Building the Business Case: A Customer's Perspective

Lightning Talk 2: Operational Evidence that Drives the Decision

Lightning Talk 3: Finding the RIght Fit - SEG or API?

 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Protection in an M365-First World: Data That Drives the Decision

Time: 2:45 PM - 2:55 PM

Speaker(s): 

Nathan Dube, IT Security Manager, Viant Medical

Monica Gupta, Sr. Product Marketing Manager, Proofpoint

Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value, and demonstrated how Proofpoint's human-centric approach matters to the business.

Lightning Talk 1: Building the Business Case - A Customer's Perspective

Lightning Talk 2: Operational Evidence that Drives Decisions

Lightning Talk 3: Finding the Right Fit - SEG or API?

CPE Credit Eligibility: 

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions. 

To receive CPE credits for a specific track:

  • Attend at least two (2) sessions within the same track to qualify 1.0 CPE credits.

  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits.

CPE credits are calculated based on 50-minute hour in accordance with NASBA/AICPA standards. It's the attendee's responsibility to track their participation and ensure compliance with their organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting visit: https://protect2025.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Protection in an M365-First World: Data That Drives the Decision

Time: 2:55 PM - 3:05 PM

Speaker(s): 

Nathan Dube, IT Security Manager, Viant Medical

Monica Gupta, Sr. Product Marketing Manager, Proofpoint

Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value, and demonstrated how Proofpoint's human-centric approach matters to the business.

Lightning Talk 1: Building the Business Case - A Customer's Perspective

Lightning Talk 2: Operational Evidence that Drives the Decision

Lightning Talk 3: Finding the Right Fit - SEP or API?

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credits for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit.
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits. 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report. 

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

 

 

Protect 2025 | Day 2

Revolutionizing Your SOC Investigations with Threat Protection Workbench

Time: 3:10 PM - 3:20 PM

Speaker(s): 

Neha Anand, Director, Product Marketing, Proofpoint

Jennica Brodeur, Staff Expert Customer Success Manager, Proofpoint

 

Threat Protection Workbench is a game-changer for SOC analysts. In this session we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.

Lightning Talk 1: Smarter, faster investigations—powered by AI and built for analysts 

Lightning Talk 2: Remediation -Seamlessly manage blocklists, safelists, URLs, and hashes to stop threats at scale.

Lightning Talk 3: SOC success stories— responding with speed, clarity, and control 

 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Revolutionizing Your SOC Investigations with Threat Protection Workbench

Time: 3:20 PM - 3:30 PM

Speaker(s): 

Neha Anand, Director, Product Marketing, Proofpoint

Jennica Brodeur, Staff Expert Customer Success Manager, Proofpoint

Threat Protection Workbench is a game-changer for SOC analysts. In this session, we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.

Lightning Talk 1: Smarter, Faster Investigations - Powered by AI and Built for Analysts

Lightning Talk 2: Remediation - Seamlessly Manage Blocklists, Safelists, URLs, and Hashes to Stop Threats at Scale

Lightning Talk 3: SOC Success Stories: Responding with Speed, Clarity, and Control 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their partipication in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credit

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's requirements. 

Please note: Certificates will not be issued.  Attendees session details and agenda to self-report. 

For more information on CPE eligibility and self-reporting visit https://protect25.proofpoint.com/faqs

 

Protect 2025 | Day 2

Revolutionizing Your SOC Investigations with Threat Protection Workbench

Time: 3:30 PM - 3:45 PM

Speaker(s): 

Neha Anand, Director, Product Marketing, Proofpoint

Jennica Brodeur, Staff Expert Customer Success Manager, Proofpoint

Threat Protection Workbench is a game-changer for SOC analysts. In this session, we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.

Lightning Talk 1: Smarter, Faster Investigations—Powered by AI and Built for Analysts 

Lightning Talk 2: Remediation —Seamlessly Manage Blocklists, Safelists, URLs, and Hashes to Stop Threats at Scale

Lightning Talk 3: SOC Success Stories— Responding with Speed, Clarity, and Control 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Eduction (CPE) credits based on their participation in qualifying sessions.

To receive CPE credits for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit.
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits.

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance their professional organization's reporting requirements. 

Please note: Certificates will not be issued.  Attendees may use session details and agendas to self-report. 

For more information on CPE eligibility and self-reporting visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Reducing Risk and Taming Complexity with an Integrated Platform

Time: 1:00 PM - 1:30 PM

Speaker(s): 

Cheryl Tang, Sr. Director, Product Marketing, Proofpoint

More tools often mean more complexity—and more risk. As threats grow and environments expand, point solutions can’t keep up. In this session, we’ll explore the challenges of managing fragmented point solutions and discuss how an integrated platform approach streamlines operations, strengthens defenses and delivers better security outcomes with lower TCO.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2: Defend Against Two Sides of Account Compromise

Defend Against Two Sides of Account Compromise

Time: 1:35 PM - 2:05 PM

Speaker(s): 

Mary Benton, Sr. Information Security Analyst, Meijer

Greg Bowman, Security Manager, Cintas

Sara Pan, Director, Product Marketing, Proofpoint

As the digital workspace expands, account compromise is becoming increasingly inevitable. Attackers are also shifting tactics—targeting your suppliers and business partners to reach your employees. Learn about the strategies and essential capabilities needed to effectively defend against these evolving threats.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Time: 2:35 PM - 2:45 PM

Speaker(s): 

Iza Kosterkiewicz, Security Delivery Senior Manager, Accenture

Craig Temple, Staff Product Marketing Manager, Proofpoint

Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.

Lightning Talk 1: The DMARC Journey 

Lightning Talk 2: Protecting Application-Generated Email

Lightning Talk 3: Leverage Domain Takedown Services

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Time: 2:45 PM - 2:55 PM

Speaker(s): 

Iza Kosterkiewicz, Security Delivery Senior Manager, Accenture

Craig Temple, Staff Product Marketing Manager, Proofpoint

Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.

Lightning Talk 1: The DMARC Journey

Lightning Talk 2: Protecting Application-Generated Email

Lightning Talk 3: Leveraging Domain Takedown Services

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credits for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credits.
  • Attend three (3) sessions within the same track to quality for 1.5 CPE credits. 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.

Please note:  Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility, visit https://protect25.proofpoint.com/faqs

 

Protect 2025 | Day 2

Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Time: 2:55 PM - 3:05 PM

Speaker(s): 

Iza Kosterkiewicz, Security Delivery Senior Manager, Accenture 

Craig Temple, Staff Product Marketing Manager, Proofpoint

Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.

Lightning Talk 1: The DMARC Journey

Lightning Talk 2: Protecting Application-Generated Email

Lightning Talk 3: Leveraging Domain Takedown Services 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions. 

To receive CPE credits for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credits.
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits.

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Time: 3:10 PM - 3:20 PM

Speaker(s): 

Davide Canali, Director, Threat Research, Proofpoint

Yaniv Miron, Sr. Manager, Threat Research, Proofpoint

Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.

Lightning Talk 1: Pre-Account Takeover

Lightning Talk 2: Phishing in Action

Lightning Talk 3: Post-Account Takeover 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Time: 3:20 PM - 3:30 PM

Speaker(s): 

Davide Canali, Director, Threat Research, Proofpoint

Yaniv Miron, Sr. Manager, Threat Research, Proofpoint

Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.

Lightning Talk 1: Pre-Account Takeover

Lightning Talk 2: Phishing in Action

Lightning Talk 3: Post-Account Takeover

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credits for a specifc track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credits.
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits. 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Time: 3:30 PM - 3:45 PM

Speaker(s): 

Davide Canali, Director, Threat Research, Proofpoint

Yaniv Miron, Sr. Manager, Threat Research, Proofpoint

Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.

Lightning Talk 1: Pre-Account Takeover

Lightning Talk 2: Phishing in Action

Lightning Talk 3: Post-Account Takeover

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Eduction (CPE) credits based on their participation in qualifying sessions. 

To receive CPE credits for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credits.
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits. 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.

Please note: Certificates will not be issued.  Attendees may use session details and agendas to self-report. 

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Making Unified Data Security a Reality with Proofpoint

Time: 1:00 PM - 1:30 PM

Speaker(s): 

Trey Tunnell, CISO, Floor & Decor 

Ovais Shekhani, Director, IT Security Operations, AMA

Tucker Shepard, Sr. Manager, Information Security & HIPAA Security Officer, Regent Surgical

Joshua Linkenhoker, Team Lead, Staff Sales Engineer, Proofpoint 

As defenders of your organization’s data, you know how disconnected tools and manual processes can make it challenging to secure your sensitive information. Join this session for practical guidance from Proofpoint experts and practitioners on how to build a unified, AI-driven data security program to protect against data exfiltration, exposure, and insider threats.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Stop Insider Risks Before They Become Headlines

Time: 1:35 PM - 2:05 PM

Speaker(s): 

John Padlo, Senior Manager, Threat Intelligence, Cyber Defense Operations

Stephanie Torto, Sr. Product Marketing Manager, Proofpoint

Most organizations address insider risk only after the damage has been done. Learn how early identification and behavioral monitoring can shift your strategy from reactive to proactive. This session examines real-world scenarios involving careless users and malicious insiders, highlighting how a comprehensive approach can mitigate risk before incidents occur.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Data Security Innovations You Shouldn't Miss

Time: 2:35 PM - 2:45 PM

Speaker(s): 

Aruna Sreeram, Sr. Director, Product Management Information Protection, Proofpoint

Curtis Wray, Staff Security Architect, Proofpoint

Andrew Hermance, Sr. Expert Customer Success Manager, Proofpoint

Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!

Lightning Talk 1: Human Risk Explorer and Dynamic Endpoint Policies 

Lightning Talk 2: Nexus File Lineage

Lightning Talk 3: Advanced Detectors at the Endpoint 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Data Security Innovations You Shouldn't Miss

Time: 2:45 PM - 2:55 PM

Speaker(s): 

Aruna Sreeram, Sr. Director, Product Management Information Protection, Proofpoint

Curtis Wray, Staff Security Architect, Proofpoint

Andrew Hermance, Sr. Expert Customer Success Manager, Proofpoint 

Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!

Lightning Talk 1: Human Risk Explorer and Dynamic Endpoint Policies 

Lightning Talk 2: Nexus File Lineage

Lightning Talk 3: Advanced Detectors at the Endpoint 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions. 

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report. 

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Data Security Innovations You Shouldn't Miss

Time: 2:55 PM - 3:05 PM

Speaker(s):

Aruna Sreeram, Sr. Director, Product Management Information Protection, Proofpoint

Curtis Wray, Staff Security Architect, Proofpoint

Andrew Hermance, Sr. Expert Customer Success Manager, Proofpoint

Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!

Lightning Talk 1: Human Risk Explorer and Dynamic Endpoint Policies 

Lightning Talk 2: Nexus File Lineage 

Lightning Talk 3: Advanced Detectors at the Endpoint 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CEP eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint for Proofpoint: Securing Enterprise AI

Time: 3:10 PM - 3:20 PM

Speaker(s): 

John Abel, SVP & Chief Information Officer, Proofpoint

JP Dinh, VP, Digital Experience & Enablement, Proofpoint

Itir Clarke, Staff Product Marketing Manager, Proofpoint

As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.

Lightning Talk 1: Secure AI Platform Configurations 

Lightning Talk 2: Granular Data Access Enforcement 

Lightning Talk 3: Safe Agent and Workflow Development 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint for Proofpoint: Securing Enterprise AI

Time: 3:20 PM - 3:30 PM

Speaker(s): 

John Abel, SVP & Chief Information Officer, Proofpoint 

Curtis Wray, Staff Security Architect, Proofpoint

Andrew Hermance, Sr. Expert Customer Success Manager, Proofpoint 

As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.

Lightning Talk 1: Secure AI Platform Configurations

Lightning Talk 2: Granular Data Access Enforcement

Lightning Talk 3: Safe Agent and Workflow Development

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions. 

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report. 

For more information on CPE eligibilty and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint for Proofpoint: Securing Enterprise AI

Time: 3:30 PM - 3:45 PM

Speaker(s): 

John Abel, SVP & Chief Information Officer, Proofpoint

JP Dinh, VP, Digital Experience & Enablement, Proofpoint

Itir Clarke, Staff Product Marketing Manager, Proofpoint

As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.

Lightning Talk 1: Secure AI Platform Configurations

Lightning Talk 2: Granular Data Access Enforcement

Lightning Talk 3: Safe Agent and Workflow Development

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions. 

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsiblity to track their participation and ensure compliance with their professional organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report. 

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proving It Works: How to Effectively Measure Security Behavior Change

Time: 1:00 PM - 1:30 PM

Speaker(s): 

Katlyn Ostrom, Cybersecurity Strategy Sr. Program Manager, Proofpoint

Paul Chavez, Sr. Product Marketing Manager, Proofpoint 

This session explores how to effectively measure security behavior change at both the operational and strategic levels. You'll learn how to go beyond basic metrics like click rates and course completions to identify indicators that reflect true behavior change and risk reduction.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Fusing Threat Intelligence with Targeted Risk Education

Time: 1:35 PM - 2:05 PM

Speaker(s): 

Keith Roberts, SOC Manager, Abbott

Chris Dawson, Principal Threat Intelligence Analyst, Proofpoint

Garrett Guinivan, Staff Sales Engineer, Proofpoint

As AI empowers attackers to craft more convincing phishing lures at scale, traditional training methods are no longer enough. In today’s dynamic threat landscape, security teams need smarter, more adaptive ways to prepare users for evolving attack tactics. Join our experts to discover how threat intelligence can elevate your program—enhancing learner engagement, changing user behavior, and driving measurable improvements in organizational resilience.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

Time: 2:35 PM - 2:45 PM

Speaker(s): 

Michelle Stephens, Cybersecurity Education & Digital Content Specialist, Oak Ridge National Laboratory

Gretel Eagan, Services Positioning & Sales Enablement Sr. Manager, Proofpoint

The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.

Lightning Talk 1: Identifying Cultural Influences

Lightning Talk 2: Building Your Advocate Network 

Lightning Talk 3: Elevating Everyday Engagement 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

Time: 2:45 PM - 2:55 PM

Speaker(s): 

Michelle Stephens, Cybersecurity Education & Digital Content Specialist, Oak Ridge National Laboratory 

Gretel Eagan, Services Positioning & Sales Enablement Sr. Manager

The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.

Lightning Talk 1: Identifying Cultural Influences

Lightning Talk 2: Building your Advocate Network

Lightning Talk 3: Elevating Everyday Engagement 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions:

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

Time: 2:55 PM - 3:05 PM

Speaker(s): 

Michelle Stephens, Cybersecurity Education & Digital Content Specialist, Oak Ridge National Laboratory

Getel Eagan, Services Positioning & Sales Enablement Sr. Manager

The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.

Lightning Talk 1: Identifying Cultural Influences 

Lightning Talk 2: Building Your Advocate Network

Lightning Talk 3: Elevating Everyday Engagement 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions. 

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report. 

For more information on CPE eligiblity and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Security Culture in the Real World: Stories That Inspire Action

Time: 3:10 PM - 3:20 PM

Speaker(s): 

Peter Lopez-Perez, Cybersecurity Engagement Specialist, Sharp HealthCare 

Lynn Harrington, Sr. Product Marketing Manager, Proofpoint

Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Security Culture in the Real World: Stories That Inspire Action

Time: 3:20 PM - 3:30 PM

Speaker(s): 

Peter Lopez-Perez, Cybersecurity Engagement Specialist, Sharp HealthCare

Lynn Harrington, Sr. Product Marketing Manager, Proofpoint

Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.

Lightning Talk 1: From Simulation to Education - Tailored Learning in Action

Lightning Talk 2: Introducing the Cybersecurity Personality Assessment 

Lightning Talk 3: The "Game" of Shaping Behavior Change 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report. 

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Security Culture in the Real World: Stories That Inspire Action

Time: 3:30 PM - 3:45 PM

Speaker(s): Coming soon

Peter Lopez-Perez, Cybersecurity Engagement Specialist, Sharp HealthCare

Lynn Harrington, Sr. Product Marketing Manager, Proofpoint

Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.

Lightning Talk 1: From Simulation to Education - Tailored Learning in Action

Lightning Talk 2: Introducing the Cybersecurity Personality Assessment 

Lightning Talk 3: The "Game" of Shaping Behavior Change 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report. 

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Spotlight Theater: Welcome to the Endgame

Time: 4:00 PM - 5:00 PM

Speaker(s):

Daniel Blackford, Sr. Director, Threat Research, Proofpoint 

Get a behind-the-scene look at one of the most ambitious cybercrime takedowns in recent history. Proofpoint's Daniel Blackford will reveal how Operation Endgame disrupted global ransomware networks--and what happened next. From tracking threat actors like TA577 and Qbot to dismantling malware families like Smokeloader and Lockbit, this session dives into the tactics, timelines, and international coordination required to strike at the heart of cybercrime. This is your sneak peek at a session set to hit the stage at Goware and RSAC 2026--don't miss your chance to hear it first at Proofpoint Protect 2026.

 

Protect 2025 | Day 2

Travel to Nashville Nights

Time: 5:30 PM - 6:00 PM

Shuttle transportation will be provided to the evening event, giving you time to drop off your bags and freshen up after a full day at the conference. Hop on board and relax as we take care of getting you there comfortably and on time.

Protect 2025 | Day 2

Nashville Nights at Proofpoint Protect 2025

Time: 6:00 PM - 9:00 PM

Get ready to turn up the volume in Music City! Join us for an unforgettable night at our Nashville Nights at Proofpoint Protect 2025 — located in the heart of the iconic Broadway strip. This exclusive evening event is the perfect chance to unwind, connect, and celebrate alongside fellow customers, partners, and industry peers. With live music, Southern-inspired bites, and sweeping rooftop views, you’ll experience the true spirit of Nashville — where great conversations meet even greater country vibes. Don’t miss this high-energy highlight of the conference that blends networking with a taste of local flavor.

Protect 2025 | Day 3

Power Series Live! Navigating the Ever-Evolving Threat Landscape

Time: 9:00 AM - 10:30 AM

Speakers(s):

Speaker(s):

Chris Inglis, Former U.S. National Cyber Director

Ryan Kalember, Chief Strategy Officer, Proofpoint, Inc. (Host)

Daniel Blackford, Sr. Director, Threat Research, Proofpoint, Inc.

Cristiana Kittner, Sr. Manager, Threat Research, Proofpoint, Inc.

With trillions of email and cloud-based attacks occurring annually, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.

Join us for a special edition of the Proofpoint Power Series, broadcast live from Protect 2025 in Nashville. This session will feature insights from leaders in our Threat Research program as they explore the current state of the threat landscape and what it takes to stay ahead of adversaries. From espionage and cybercrime to the growing role of AI, one truth remains constant: people are at the center of today’s cybersecurity challenges.

Topics will include:

  • The ever-evolving threat landscape: what’s changed and what’s stayed the same in 2025
  • The increasingly blurred lines between cybercrime and nation-state actors
  • The national security implications of AI, one year later

With industry-leading visibility into malicious activity, Proofpoint protects customers from billions of email, cloud, SMS, and insider threats every year. Don’t miss this opportunity to hear from the experts shaping the future of cybersecurity.

CPE Credit Eligibility
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in this session.

This session qualifies for 1.5 CPE credits, based on a total instructional time of 90 minutes. CPE credits are calculated using a 50-minute hour in accordance with NASBA/AICPA standards.

Please note:

  • Certificates will not be issued for this session.
  • It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
  • Supporting materials such as session descriptions and agendas may be used for self-reporting.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 3

Maximize the Full Potential of Core Email Protection

Time: 10:45 AM - 11:15 AM

Speaker(s): 

James Knight, Principal Professional Services Consultant, Proofpoint

Michael Beninda, Principal Professional Services Consultant, Proofpoint 

Misconfigurations in email security setups can quietly create gaps that attackers exploit—especially in Microsoft 365 and hybrid environments. We’ll walk through the most common missteps organizations make, like missing a key setting in M365 that allows direct delivery, incorrect relay permissions, or firewall rules that let unwanted traffic through. We’ll share real-world examples to show how to identify issues that can lead to big risks—and how to fix them quickly. You'll come away with practical tips to boost protection without added complexity.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 3

Inside Nexus: How Proofpoint Uses AI to Stop Email Threats

Time: 11:20 AM - 11:50 AM

Speaker(s): 

Pablo Passera, VP Product Management, Proofpoint

Get an inside look at the AI-powered defenses built into Proofpoint products. Learn how our models detect threats in real time—and how these innovations protect your users across every email. Get an early look at upcoming Nexus detection innovations.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

2025 in Email Threats: What Hit, What Hurt, What’s Next

Time: 12:35 PM - 12:45PM

Speaker(s): 

Cristina Kittner, Sr. Manager, Threat Research, Proofpoint

We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.

Lightning Talk 1: What Hit - Social Engineering at Scale

Lightning Talk 2: What Hurt - Exploiting Trust with Legitimate Tools

Lightning Talk 3: What's Next - Future-Proofing Against 2026 Threats 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

2025 in Email Threats: What Hit, What Hurt, What’s Next

Time: 12:45PM - 12:55 PM

Speaker(s): 

Cristina Kittner, Sr. Manager, Threat Research, Proofpoint

We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.

Lightning Talk 1: What Hit - Social Engineering at Scale

Lightning Talk 2: What Hurt - Exploiting Trust with Legitimate Tools

Lightning Talk 3: What's Next - Future-Proofing Against 2026 Threats 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

2025 in Email Threats: What Hit, What Hurt, What’s Next

Time: 12:55 PM - 1:05 PM

Speaker(s):

Cristina Kittner, Sr. Manager, Threat Research, Proofpoint

We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.

Lightening Talk 1: What Hit - Social Engineering at Scale

Lightening Talk 2: What Hurt - Exploiting Trust with Legitimate Tools

Lightening Talk 3: What's Next - Future-Proofing Against 2026 Threats 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

BEC 3.0: AI and the Next $1 Billion Fraud

Time: 1:10 PM - 1:20 PM

Speaker(s): 

Jason Hurst, Sr. Manager, Computer Security, Panda Restaurant Group

Davide Canali, Director, Threat Research, Proofpoint

Email fraud is evolving fast—and it’s getting harder to spot. In this session, we’ll break down the next wave of emerging attacks, blending front-line threat research with real-world customer cases. From the use of AI to identity spoofing, today’s attackers are using new tools to exploit trust in ways we’ve never seen before. You’ll leave with a clear picture of where threats are headed, and how to future-proof your defenses for 2026 and beyond.

Lightning Talk 1: BEC Seen in the Wild 

Lightning Talk 2: BEC by the Numbers - Data Trends and AI Tactics

Lightning Talk 3: Staying Smarter than the Latest BEC Scams 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsiblity to track their participation and ensure compliance with their professional organization's reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

BEC 3.0: AI and the Next $1 Billion Fraud

Time: 1:20 PM - 1:30 PM

Speaker(s): 

Jason Hurst, Sr. Manager, Computer Security, Panda Restaurant Group

Davide Canali, Director, Threat Research, Proofpoint

Email fraud is evolving fast—and it’s getting harder to spot. In this session, we’ll break down the next wave of emerging attacks, blending front-line threat research with real-world customer cases. From the use of AI to identity spoofing, today’s attackers are using new tools to exploit trust in ways we’ve never seen before. You’ll leave with a clear picture of where threats are headed, and how to future-proof your defenses for 2026 and beyond.

Lightning Talk 1: BEC Seen in the Wild 

Lightning Talk 2: BEC by the Numbers - Data Trends and AI Tactics

Lightning Talk 3: Staying Smarter than the Latest BEC Scams 

CPE Credit Eligibility:

Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsiblity to track their participation and ensure compliance with their professional organization's reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

From Email to Everywhere: Stopping Threats Across Digital Channels

Time: 10:45 AM - 11:15 AM

Speaker(s): 

Jennifer L. Wood, Sr. IT Operations Engineer, Delta Air Lines 

Sara Pan, Director, Product Marketing, Proofpoint

Alexis Dorais-Joncas, Sr. Manager, Threat Research 

While email remains the primary threat vector, attackers are increasingly exploiting digital channels like Teams, Slack, and Zoom to target users. Join this session as our experts and customers discuss the sophisticated tactics observed across these platforms—and share effective security controls to help you stay ahead of the evolving attack surface.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Improving Email Deliverability: From Users to Applications

Time: 11:20 AM - 11:50 AM

Speaker(s): 

Ash Valeski, Sr. SER Solutions Director 

Matthew Moorehead, Director, SSA Services

Organizations today rely heavily on email—whether sent by users or applications, hosted in the cloud or on-premises. As they navigate challenges like cloud migration, end-of-life for legacy Exchange environments, evolving security threats, and DMARC compliance, ensuring reliable email deliverability has become increasingly complex. Join this session as our experts break down the key elements for improving deliverability across both user- and application-generated email while ensuring clean, trusted email traffic.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Email Authentication: What the Future Holds

Time: 12:35 PM - 2:45 PM

Speaker(s): 

Kevin San Diego, VP Product Management, Sender Security & Authentication, Proofpoint

Matthew Moorehead, Director, SSA Services 

Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.

Lightning Talk 1: What You Need to Know About DMARCbis

Lightning Talk 2: Emerging DKIM2 Standards Discussion 

Lightning Talk 3: Changes in Email Receiver Landscape

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Email Authentication: What the Future Holds

Time: 12:45 PM - 12:55 PM

Speaker(s):

Kevin San Diego, VP Product Management, Sender Security & Authentication, Proofpoint

Matthew Moorehead, Director, SSA Services 

Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.

Lightning Talk 1: What You Need to Know About DMARCbis

Lightning Talk 2: Emerging DKIM2 Standards Discussion 

Lightning Talk 3: Changes in Email Receiver Landscape

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Email Authentication: What the Future Holds

Time: 12:55 PM - 1:05 PM

Speaker(s): 

Kevin San Diego, VP Product Management, Sender Security & Authentication, Proofpoint

Matthew Moorehead, Director, SSA Services 

Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.

Lightning Talk 1: What You Need to Know About DMARCbis

Lightning Talk 2: Emerging DKIM2 Standards Discussion 

Lightning Talk 3: Changes in Email Receiver Landscape

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Building a Strong SaaS Security Posture with Proofpoint 

Time: 1:10 PM - 1:20 PM 

Speaker(s): 

Josh Tweeten, Sr. Cyber Security Analyst, Information Technology Services Dept., Hormel Foods Corporate Services LLC

Itay Nachum, Sr. Director, Product Management, Proofpoint

Curtis Wray, Staff Security Architect, Proofpoint 

Shadow SaaS and SaaS application misconfigurations are a growing source of risk in enterprises. In this session, explore how Proofpoint's SaaS and Identity Posture Management solution can help your organization discover and manage shadow SaaS usage and remediate exposures for sanctioned SaaS applications before they cause security incidents, with real-world insights from a featured customer. Discover how to harness the capabilities of the Proofpoint human-centric platform for a more intelligent, secure SaaS application ecosystem. 

Lightning Talk 1: Bring Unsanctioned SaaS and identities Out of the Shadows

Lightning Talk 2: Fortify the Posture of Your Enterprise SaaS Applications

Lightning Talk 3: Strengthening SaaS security posture: A real-life example 

CPE Credit Eligibility:

Attendees may be eligibile to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credits for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Building a Strong SaaS Security Posture with Proofpoint 

Time: 1:10 PM - 1:20 PM 

Speaker(s): 

Josh Tweeten, Sr. Cyber Security Analyst, Information Technology Services Dept., Hormel Foods Corporate Services LLC

Itay Nachum, Sr. Director, Product Management, Proofpoint

Curtis Wray, Staff Security Architect, Proofpoint 

Shadow SaaS and SaaS application misconfigurations are a growing source of risk in enterprises. In this session, explore how Proofpoint's SaaS and Identity Posture Management solution can help your organization discover and manage shadow SaaS usage and remediate exposures for sanctioned SaaS applications before they cause security incidents, with real-world insights from a featured customer. Discover how to harness the capabilities of the Proofpoint human-centric platform for a more intelligent, secure SaaS application ecosystem. 

Lightning Talk 1: Bring Unsanctioned SaaS and identities Out of the Shadows

Lightning Talk 2: Fortify the Posture of Your Enterprise SaaS Applications

Lightning Talk 3: Strengthening SaaS security posture: A real-life example 

CPE Credit Eligibility:

Attendees may be eligibile to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credits for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Building a Strong SaaS Security Posture with Proofpoint 

Time: 1:30 PM - 1:40 PM 

Speaker(s): 

Josh Tweeten, Sr. Cyber Security Analyst, Information Technology Services Dept., Hormel Foods Corporate Services LLC

Itay Nachum, Sr. Director, Product Management, Proofpoint

Curtis Wray, Staff Security Architect, Proofpoint 

Shadow SaaS and SaaS application misconfigurations are a growing source of risk in enterprises. In this session, explore how Proofpoint's SaaS and Identity Posture Management solution can help your organization discover and manage shadow SaaS usage and remediate exposures for sanctioned SaaS applications before they cause security incidents, with real-world insights from a featured customer. Discover how to harness the capabilities of the Proofpoint human-centric platform for a more intelligent, secure SaaS application ecosystem. 

Lightning Talk 1: Bring Unsanctioned SaaS and identities Out of the Shadows

Lightning Talk 2: Fortify the Posture of Your Enterprise SaaS Applications

Lightning Talk 3: Strengthening SaaS security posture: A real-life example

CPE Credit Eligibility:

Attendees may be eligibile to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credits for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits 

CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements. 

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Time to Shift to Modern Human-Centric DLP

Time: 10:45 AM - 11:15 AM

Speaker(s): 

Stacy Knoup, Director of Engineering, Principal Financial Group

Jeremy Wittkop, Sr. Manager, Product Evangelist Services, Proofpoint

Now is the time to shift to modern, human-centric DLP. Learn how Proofpoint’s adaptive, AI-driven solutions unify content and behavior insights—identifying sensitive data, monitoring risky actions, and dynamically adjusting controls. Gain practical guidance on how to evaluate alternatives, transition from legacy DLP solutions, expand your program without increasing headcount, and communicate the value of your program to management and the board.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Guardrails for GenAI: A Data Security Playbook

Time: 11:20 AM - 11:50 AM

Speaker(s): 

Itir Clarke, Staff Product Marketing Manager, Proofpoint

GenAI tools, such as ChatGPT and Microsoft Copilot, are accelerating productivity and innovation, but not without risk. As employees use these tools to streamline tasks and build applications, sensitive data can be unintentionally exposed or misused. This session shares actionable strategies for governing Copilot and managing Shadow AI risks, enabling everyone, from knowledge workers to developers, to use AI safely.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Time: 12:35 PM - 12:45 PM

Speaker(s): 

Itir Clarke, Staff Product Marketing Manager, Proofpoint

James Knight, Principal Professional Services Consultant

Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.

Lightning Talk 1: Snowflake Data Access Governance

Lightning Talk 2: Abandoned Data Discovery

Lightning Talk 3: Data Classification for Cloud Data Stores 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Time: 12:45 PM - 12:55 PM

Speaker(s): 

Itir Clarke, Staff Product Marketing Manager, Proofpoint

James Knight, Principal Professional Services Consultant

Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.

Lightning Talk 1: Snowflake Data Access Governance

Lightning Talk 2: Abandoned Data Discovery

Lightning Talk 3: Data Classification for Cloud Data Stores 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Time: 12:55 PM - 1:05 PM

Speaker(s): 

Itir Clarke, Staff Product Marketing Manager, Proofpoint

James Knight, Principal Professional Services Consultant

Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.

Lightning Talk 1: Snowflake Data Access Governance

Lightning Talk 2: Abandoned Data Discovery

Lightning Talk 3: Data Classification for Cloud Data Stores 

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Mastering a Hybrid Approach to Email DLP

Time: 1:10 PM - 1:20 PM

Speaker(s): 

Mike Olden, Senior Principal PS Consultant, Proofpoint

Vishal Patel, Sr. Sales Engineer, Proofpoint

Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.

Lightning Talk 1: The Anatomy of Email Data Exfiltration 

Lightning Talk 2: Key Benefits of a Comprehensive Approach to Email DLP

Lightning Talk 3: Prescriptive Guide to Hybrid Email DLP

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Mastering a Hybrid Approach to Email DLP

Time: 1:20 PM - 1:30 PM

Speaker(s): 

Mike Olden, Senior Principal PS Consultant, Proofpoint

Vishal Patel, Sr. Sales Engineer, Proofpoint

Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.

Lightning Talk 1: The Anatomy of Email Data Exfiltration 

Lightning Talk 2: Key Benefits of a Comprehensive Approach to Email DLP

Lightning Talk 3: Prescriptive Guide to Hybrid Email DLP

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Mastering a Hybrid Approach to Email DLP

Time: 1:30 PM - 1:40 PM

Speaker(s):

Mike Olden, Senior Principal PS Consultant, Proofpoint

Vishal Patel, Sr. Sales Engineer, Proofpoint

Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.

Lightning Talk 1: The Anatomy of Email Data Exfiltration 

Lightning Talk 2: Key Benefits of a Comprehensive Approach to Email DLP

Lightning Talk 3: Prescriptive Guide to Hybrid Email DLP

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

A Roadmap for Human Risk Resilience via Insight, Automation & Contextual Learning

Time: 10:45 AM - 11:15 AM

Speaker(s): 

Nick McClay, Sr. Director, Product Management, Proofpoint

Get visibility into Proofpoint Human-centric security roadmap, highlighting the use of AI, automated workflows, and integrations between Human Risk Explorer and ZenGuide. Innovations that identify at-risk employees and deliver contextual learning experiences that result in strengthened resilience against today’s human-centric threat landscape. This session will demonstrate these capabilities in the context of a security admin and end-user experience that combines detection of human risk trends, adaptive risk-based delivery of content, contextual education based on user choice, and measurement of behavior change and risk reduction.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Operationalizing Human Risk Data to Drive Behavior Change

Time: 11:20 AM - 11:50 AM

Speaker(s): 

Curtis Wray, Staff Security Architect, Proofpoint

Simon Pople, Sr. Product Manager, Proofpoint

What does it mean to be a high-risk user? This session will help you answer that and more. Learn best practices for building meaningful risk profiles using key risk attributes like threat exposure, vulnerability to phishing, data handling behaviors, and user privilege. We’ll discuss how to interpret and act on these insights by aligning profiles with targeted training, user notifications, simulations, and assessments so you can drive real behavior change where it matters most.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

From Awareness to Action with Proofpoint's Maturity Model

Time: 12:35 PM - 12:45 PM

Speaker(s): 

Dr. Bob Hausman, Lead Cognitive Scientist, Human Risk Management, Proofpoint 

Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint

Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.

Lightning Talk 1: Why Awareness Training Falls Short - and What Comes Next

Lightning Talk 2: The Science Behind Behavior Change in Cybersecurity Learning 

Lightning Talk 3: Applying the Human Risk Management Maturity Model (MRM-MM)

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

From Awareness to Action with Proofpoint's Maturity Model

Time: 12:45 PM - 12:55 PM

Speaker(s): 

Dr. Bob Hausman, Lead Cognitive Scientist, Human Risk Management, Proofpoint 

Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint

Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.

Lightning Talk 1: Why Awareness Training Falls Short - and What Comes Next

Lightning Talk 2: The Science Behind Behavior Change in Cybersecurity Learning 

Lightning Talk 3: Applying the Human Risk Management Maturity Model (MRM-MM)

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

From Awareness to Action with Proofpoint's Maturity Model

Time: 12:55 PM - 1:05 PM

Speaker(s):

Dr. Bob Hausman, Lead Cognitive Scientist, Human Risk Management, Proofpoint 

Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint

Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.

Lightning Talk 1: Why Awareness Training Falls Short - and What Comes Next

Lightning Talk 2: The Science Behind Behavior Change in Cybersecurity Learning 

Lightning Talk 3: Applying the Human Risk Management Maturity Model (MRM-MM)

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Time: 1:10 PM - 1:20 PM

Speaker(s): 

Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint

Kurt Wesco, CTO - Proofpoint Security Awareness Products, Proofpoint 

Simon Pople, Sr. Product Manager, Proofpoint

Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.

Lightning Talk 1: AI-Driven Security Content Creation and Curation

Lightning Talk 2: GenAI Phish Hooks and Teachable Moments

Lightning Talk 3: Automated Risk-based Learning

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Time: 1:20 PM - 1:30 PM

Speaker(s): 

Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint

Kurt Wesco, CTO - Proofpoint Security Awareness Products, Proofpoint 

Simon Pople, Sr. Product Manager, Proofpoint

Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.

Lightning Talk 1: AI-Driven Security Content Creation and Curation

Lightning Talk 2: GenAI Phish Hooks and Teachable Moments

Lightning Talk 3: Automated Risk-based LearningLightning Talk 1: AI-Driven Security Content Creation and Curation

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Time: 1:30 PM - 1:40 PM

Speaker(s):

Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint

Kurt Wesco, CTO - Proofpoint Security Awareness Products, Proofpoint 

Simon Pople, Sr. Product Manager, Proofpoint

Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.

Lightning Talk 1: AI-Driven Security Content Creation and Curation

Lightning Talk 2: GenAI Phish Hooks and Teachable Moments

Lightning Talk 3: Automated Risk-based Learning

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Beyond Algorithms: Strategies for Leveraging AI, Data and Emerging Technologies to Solve Human Problems 

Time: 1:45 PM - 2:30 PM

Speaker(s):

Dr. Poppy Crum, Expert in AI, Technology-Driven Innovation & Human Evolution Futurist, Neuroscientist, and Technologist

Ryan Kalember, Chief Strategy Officer, Proofpoint

In a time when emerging technologies are transforming industries and the human experience at an unprecedented pace, Dr. Poppy Crum invites us to look beyond the technical capabilities of AI and the data.  A leading voice in the tech-driven innovation, Dr. Crum explores how organizations can harness tools like generative AI not just to drive business outcomes, but to address real human challenges. 

This session will challenge attendees to think critically about the intent behind their technology strategies, the ethical implications of innovation, and how to create meaningful human connections -- even with content not created by humans. Dr. Crum's insights will spark new conversations and inspire a more holistic approach to integrating emerging technologies into business and society. 

Protect 2025

Maximize: Email Protection

Core Email Protection

Threat actors are still using email as the number one threat vector, but now they’re making it personal. If BEC, ransomware, and phishing attacks have you down, then this track is for you. Discover how Agentic AI can power up your SOC to stop advanced email threats. Whether you are augmenting your productivity suite, have a need for speed with API deployments, or want rich comprehensive protections through a Secure Email Gateway, this track will explore the flexibility that Proofpoint offers. Don’t forget to look under the hood of the engine that powers it all, mitigating risks with AI and threat intelligence.

  • Learn how to stop targeted attacks directed at your people
  • Reveal how to use Agentic AI to be a force multiplier for your SOC
  • Explore Proofpoint’s deployment flexibility with API and SEG
  • Discover how to mitigate risks with AI and threat intelligence
Protect 2025

Stop: Human-centric Threats

Prime Threat Protection

Feel like you are overspending on a bunch of fragmented point products that don’t talk to each other? Worried about attackers taking advantage of the ever-expanding digital workspace? Do you shudder at the thought of brand reputation damage, supply chain attacks, and account takeover? Fear no more. This track will dive into a comprehensive approach to stopping human-centric threats for today and tomorrow’s landscape. Explore a broad array of human-centric security protections that can empower organizations to maximize threat prevention and reduce most risk.

  • Discover how to protect your users beyond email
  • Explore ways to protect your brand from impersonation attacks
  • Learn how to defend against compromised supplier accounts
  • Dive into multilayered protection against multichannel, multistage attacks
Protect 2025

Transform: Data Security

Data Security, Posture, and Governance

Whether it is unintentional data leaks or malicious data theft, protecting your organization’s crown jewels and sensitive data is a human-centric challenge. Is it misdirected emails and emails to unauthorized accounts keeping you awake at night? Are you daydreaming of safeguarding data from malicious, careless and compromised insiders? How are you stopping GenAI data loss and account takeover?

  • Accelerate the maturity of your DLP programs with GenAI
  • Explore automated detection and remediation of insider threats
  • Dive into mitigating identity risks, lateral movement, and privileged escalations
  • Learn how to discover, assess, and strengthen your data at rest security posture
  • Discover the best approach for strong data governance within your organization
Protect 2025

Empower: Secure Behavior and Culture

Empower: Secure Behavior and Culture

When people get tired, rushed, and stressed it’s no surprise that they make mistakes operationally and in judgement. Threat actors are keen to take advantage of this. What if you could go beyond compliance-based awareness to drive true behavior change and build a security-minded culture? Empowering the people within your organization to be part of the security solution was once just a dream. Now it is reality.

  • Learn how to grow your program without burning out
  • Focus on engaging and empowering high-risk individuals
  • Explore insights on behavior change and security culture
  • Dive into building resilience against emerging threats
Protect 2025 | Speaker Bios

Dr. Poppy Crum

Expert in AI, Technology-Driven Innovation, & Human Evolution Futurist, Neuroscientist, and Technologist

What was the last phone number you memorized? Decades ago, this skill was second nature, yet today, we outsource it entirely to our devices—a shift that has physically altered our brains. As technology automates more of our cognitive processes, our brains adapt and fundamentally change how we think and process information. Dr. Poppy Crum’s groundbreaking research sits at this critical intersection, with a particular emphasis on the next frontier to reshape our neural pathways: AI. Poppy’s work reveals how the AI transformation is not just technological—it’s deeply human, redefining how we live, work, and connect.

In her eye-opening presentations, Poppy unpacks AI’s profound influence on our brains, using compelling industry examples to illustrate how this technology will drive change. As AI becomes a standard tool across sectors, organizations must learn to navigate and adapt to this new reality. Poppy explains how to efficiently leverage human-AI collaboration, identify gaps in skillsets, and ensure employees maintain critical thinking and decision-making abilities. This proactive approach positions industries to harness AI’s transformative potential while preserving the human touch in innovation and problem-solving.

Dr. Poppy Crum is a visionary leader and innovator at the forefront of artificial intelligence, machine learning, and human-computer interaction. As Chief Scientist at Dolby Laboratories for over a decade, she pioneered technologies that leveraged human physiology to enhance digital experiences. Later, as CTO of Trimble, Inc., she developed groundbreaking solutions connecting the physical and digital worlds. Now the founder of Goby Technologies, a consultancy for product and platform innovation with clients like Google and Universal Music Group, Poppy continues to shape the future of technology and its human applications.

She holds numerous patents, chairs global technology standards committees, and has collaborated with organizations such as DARPA and the Consumer Technology Association. A recipient of multiple prestigious awards, including the 2021 Hedy Lamarr Award for Innovation in Entertainment and Technology and the 2018 Lumiere Technology Leadership Award, she has been recognized as one of Billboard magazine’s 100 most influential female executives in the music industry. Her TED Talk on empathetic technology has garnered over one million views, and she is a sought-after speaker at events like SXSW. Through her unparalleled industry expertise, Poppy continues to guide some of the world’s most innovative organizations in aligning cutting-edge technology with human potential.

Protect 2025 | Speaker Bios

Chris Inglis

Former U.S. National Cyber Director

Chris Inglis is a distinguished cybersecurity leader with over 40 years of federal service. He served as the nation’s first National Cyber Director at the White House (2021–2023) and spent 17 years at the NSA, including as Deputy Director. A retired Brigadier General and command pilot in the U.S. Air Force and Air National Guard, Inglis also held academic and advisory roles, including as a commissioner on the U.S. Cyberspace Solarium Commission and a trustee of the National Intelligence University.

His accolades include the President’s National Security Medal and the Director of National Intelligence Distinguished Service Medal. Inglis holds advanced degrees in engineering and computer science from Columbia, Johns Hopkins, and George Washington University. He resides in Annapolis, Maryland, with his wife, Anna.

Protect 2025 | Speaker Bios

Judy Molenaar

VP, Information Security & Chief Information Security Officer, Surescripts

Judy Molenaar is the VP and Chief Information Security Officer at Surescripts. She sets the vision, develops plans and oversees the execution of Surescripts' Enterprise Information and Physical Security, Business Continuity and Enterprise Risk Management Programs to ensure comprehensive, high-quality, and effective risk and information security management in support of business goals. With 20 years in cybersecurity, she has held leadership roles overseeing global teams for governance, cybersecurity, HIPAA compliance and identity management in multiple critical industry verticals (manufacturing, retail, and healthcare industries).

Judy is currently the President of the Women in Cyber Security (WiCyS) MN affiliate, an DirectTrust Board Member & Commissioner. She earned her bachelor’s degree in organizational studies from Bethel University and holds a Masters in Security Technologies from the University of Minnesota School of Science.

Protect 2025 | Speaker Bios

Sumit Dhawan

Chief Executive Officer

As CEO of Proofpoint, Sumit Dhawan leads a global workforce of over 4,500 employees focused on defending organizations from advanced cyber threats and compliance risks by protecting their people—and in turn, safeguarding their data, business, and reputation. A seasoned executive with a proven track record, Mr. Dhawan brings over 25 years of experience in building category-leading, scaled enterprise software companies and businesses. Sumit previously served as VMware’s President, where he was responsible for driving over $13B of revenue for the company and led go-to-market functions including worldwide sales, customer success and experience, strategic ecosystem, industry solutions, marketing, and communications. He also previously served as Chief Customer Experience Officer, managing global teams responsible for professional services, technical support, and customer success. Before that, Mr. Dhawan was chief executive officer of Instart, a cybersecurity business delivering innovations in web application performance and security services and held senior executive and general management roles at Citrix.

Mr. Dhawan is a strong advocate for delivering an exceptional experience to customers and partners. He is passionate about building diverse teams and fostering inclusive cultures and equitable environments that bring out the best in everyone. Mr. Dhawan holds an MBA from the Warrington College of Business at the University of Florida, an MS in Computer Science from the University of Minnesota, and a BS in Computer Science from the Indian Institute of Technology (IIT).

Protect 2025 | Speaker Bios

Blake P. Sallé

Chief Revenue Officer

Blake P. Sallé is the Chief Revenue Officer at Proofpoint, where he leads the company’s global customer-facing and go-to-market functions. With nearly 30 years of experience, Mr. Sallé has a strong background in building strategic sales, customer success, routes to market, and field operations initiatives that drive momentum, growth, and revenue across international markets.

Before joining Proofpoint in 2017, he served as President of Kony, the leading provider of enterprise mobility solutions. Mr. Sallé has also held senior leadership positions at some of the most recognized and innovative organizations in technology and healthcare such as Cisco, VCE, VMware, EMC, Johnson & Johnson, DXC, PTC, and an Andreessen Horowitz-backed start-up acquired by RSA. Mr. Sallé holds a bachelor’s degree from the University of Texas at Austin.

Protect 2025 | Speaker Bios

Patrick Joyce

Global Resident Chief Information Security Officer, Proofpoint

Patrick Joyce is the Global Resident Chief Information Officer at Proofpoint. In this role, he serves as a strategic advisor to the greater CISO community and spearheads Proofpoint's Customer Advisory Board (CAB). He is focused solely on the security needs of customer CISOs by delivering unbiased advice, knowledge and training to help CISOs stay ahead of the curve in the ever-changing threat landscape.

Mr. Joyce is a highly respected cybersecurity practitioner and industry thought leader with over 30 years of experience in the IT and security field. Before joining Proofpoint in November 2023, he served as Vice President and Chief Security Officer (both CSO & CISO) for Medtronic, a Fortune 500 MedTech enterprise, where he was responsible for leading the company's global security strategies, operations and initiatives. 

Prior to joining Medtronic, Patrick held leadership roles in both public and private sector organizations across multiple verticals, including healthcare (both provider & payor), travel/hospitality, and IT consulting. He also served as an Officer in the US Air Force and in the US Intelligence Community.

In addition to his accomplishments as a business partner and trusted advisor, Patrick is also known for his commonsense approach, calm and careful leadership, sound judgement, and ability to communicate effectively at all levels.