two people
Agenda and Speakers
Agenda

Straight talk and insight from industry titans

Join us for a forward-looking itinerary packed with the learnings and networking you'll need to stay ahead.

Agenda
What's on

Tailor your agenda with transformative connections and learning

Day 1
Day 2
Day 3
7:00 AM - 6:00 PM

Registration

Add to calendar
9:00 AM - 4:00 PM

Certification Labs & Exams

Add to calendar
9:00 AM - 4:00 PM

Discovery Labs

Add to calendar
1:00 PM - 4:00 PM

Customer Meetings

Add to calendar
1:00 PM - 4:00 PM

Global Partner Summit

Add to calendar
2:00 PM - 4:00 PM

Proofpoint’s Women Who Cyber & AWS presents: Influence - Above and Beyond

Add to calendar
4:00 PM - 5:30 PM

Breakouts

Spotlight Theater
4:00 PM - 5:30 PM

Sessions to be announced

4:00 PM - 6:00 PM

Welcome Reception

Add to calendar
7:00 AM - 9:00 AM
7:00 AM - 9:00 AM

First-Timer Breakfast

Add to calendar
7:00 AM - 6:30 PM

Registration

Add to calendar
7:00 AM - 9:00 AM
9:00 AM - 10:05 AM

Opening Keynote

Add to calendar
10:20 AM - 10:55 AM

CISO Panel: Human-Centric Leadership in an AI-Driven Threat Landscape

Add to calendar
11:00 AM - 12:00 PM

Roadmap Session: From Vision to Reality - The Proofpoint Platform Roadmap

Add to calendar
12:00 PM - 1:00 PM
12:00 PM - 3:45 PM

Certification Labs & Exams

Add to calendar
12:00 PM - 3:45 PM

Discovery Labs

Add to calendar
12:00 PM - 3:45 PM
1:00 PM - 3:45 PM

Breakouts

Maximize: Email Protection
Stop: Human-centric Threats
Transform: Data Security
Empower: Behavior and Culture
Spotlight Theater
1:00 PM - 1:30 PM
Building a High-Efficiency Email SOC: Lessons from the Field

Too many security teams are stuck in reactive mode when responding to email threats. Some Proofpoint customers are charting a different course.

1:35 PM - 2:05 PM
Streamlining SOC Operations with Agentic AI: Roadmap

Agentic AI is reshaping how products think, act, and deliver value.

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM
Proofpoint Protection in an M365-First World: Data That Drives the Decision

Facing questions about why you need more than Microsoft 365?

2:45 PM - 2:55 PM
Proofpoint Protection in an M365-First World: Data That Drives the Decision

Facing questions about why you need more than Microsoft 365?

2:55 PM - 3:05 PM
Proofpoint Protection in an M365-First World: Data That Drives the Decision

Facing questions about why you need more than Microsoft 365?

3:10 PM - 3:20 PM
Revolutionizing Your SOC Investigations with Threat Protection Workbench

Threat Protection Workbench is a game-changer for SOC analysts.

3:20 PM - 3:30 PM
Revolutionizing Your SOC Investigations with Threat Protection Workbench

Threat Protection Workbench is a game-changer for SOC analysts.

3:30 PM - 3:45 PM
Revolutionizing Your SOC Investigations with Threat Protection Workbench

Threat Protection Workbench is a game-changer for SOC analysts.

1:00 PM - 1:30 PM
Reducing Risk and Taming Complexity with an Integrated Platform

More tools often mean more complexity—and more risk.

1:35 PM - 2:05 PM
Defend Against Two Sides of Account Compromise

As the digital workspace expands, account compromise is becoming increasingly inevitable.

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM
Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Most organizations focus on defense when it comes to impersonation threats—why not shift to offense?

2:45 PM - 2:55 PM
Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Most organizations focus on defense when it comes to impersonation threats—why not shift to offense?

2:55 PM - 3:05 PM
Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Most organizations focus on defense when it comes to impersonation threats—why not shift to offense?

3:10 PM - 3:20 PM
From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks.

3:20 PM - 3:30 PM
From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks.

3:30 PM - 3:45 PM
From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks.

1:00 PM - 1:30 PM
Making Unified Data Security a Reality with Proofpoint

As defenders of your organization’s data, you know how disconnected tools and manual processes can make it challenging to secure your sensitive information.

1:35 PM - 2:05 PM
Stop Insider Risks Before They Become Headlines

Most organizations address insider risk only after the damage has been done.

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM
Proofpoint Data Security Innovations You Shouldn't Miss

Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed.

2:45 PM - 2:55 PM
Proofpoint Data Security Innovations You Shouldn't Miss

Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed.

2:55 PM - 3:05 PM
Proofpoint Data Security Innovations You Shouldn't Miss

Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed.

3:10 PM - 3:20 PM
Proofpoint for Proofpoint: Securing Enterprise AI

As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas.

3:20 PM - 3:30 PM
Proofpoint for Proofpoint: Securing Enterprise AI

As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas.

3:30 PM - 3:45 PM
Proofpoint for Proofpoint: Securing Enterprise AI

As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas.

1:00 PM - 1:30 PM
Proving It Works: How to Effectively Measure Security Behavior Change

This session explores how to effectively measure security behavior change at both the operational and strategic levels.

1:35 PM - 2:05 PM
Fusing Threat Intelligence with Targeted Risk Education

As AI empowers attackers to craft more convincing phishing lures at scale, traditional training methods are no longer enough.

2:05 PM - 2:35 PM

Break

2:35 PM - 2:45 PM
Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

The definition of "culture" is unique to every organization, and the definition is not static.

2:45 PM - 2:55 PM
Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

The definition of "culture" is unique to every organization, and the definition is not static.

2:55 PM - 3:05 PM
Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

The definition of "culture" is unique to every organization, and the definition is not static.

3:10 PM - 3:20 PM
Security Culture in the Real World: Stories That Inspire Action

Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users.

3:20 PM - 3:30 PM
Security Culture in the Real World: Stories That Inspire Action

Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users.

3:30 PM - 3:45 PM
Security Culture in the Real World: Stories That Inspire Action

Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users.

12:15 PM - 3:45 PM

Sessions to be announced

1:00 PM - 4:00 PM

Customer Meetings

Add to calendar
4:00 PM - 5:00 PM

Guest Speaker - To be announced

Add to calendar
5:30 PM - 6:00 PM

Travel to Nashville Nights

Add to calendar
6:00 PM - 9:00 PM

Nashville Nights at Proofpoint Protect 2025

Add to calendar
7:00 AM - 9:00 AM
7:00 AM - 3:00 PM

Registration

Add to calendar
9:00 AM - 10:30 AM
Power Series Live! Navigating the Ever-Evolving Threat Landscape

With trillions of email and cloud-based attacks occurring annually, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.

Add to calendar
10:30 AM - 10:45 AM

Break

10:45 AM - 1:40 PM

Certification Labs & Exams

Add to calendar
10:45 AM - 1:40 PM

Customer Meetings

Add to calendar
10:45 AM - 1:40 PM

Discovery Labs

Add to calendar
10:30 AM - 1:40 PM
10:45 AM - 1:40 PM

Breakouts

Maximize: Email Protection
Stop: Human-centric Threats
Transform: Data Security
Empower: Behavior and Culture
10:45 AM - 11:15 AM
Maximize the Full Potential of Core Email Protection

Misconfigurations in email security setups can quietly create gaps that attackers exploit—especially in Microsoft 365 and hybrid environments.

11:20 AM - 11:50 AM
Inside Nexus: How Proofpoint Uses AI to Stop Email Threats

Get an inside look at the AI-powered defenses built into Proofpoint products.

12:35 PM - 12:45 PM
2025 in Email Threats: What Hit, What Hurt, What’s Next

We’re in an era of unprecedented innovation—unfortunately, that includes bad actors.

12:45 PM - 12:55 PM
2025 in Email Threats: What Hit, What Hurt, What’s Next

We’re in an era of unprecedented innovation—unfortunately, that includes bad actors.

12:55 PM - 1:05 PM
2025 in Email Threats: What Hit, What Hurt, What’s Next

We’re in an era of unprecedented innovation—unfortunately, that includes bad actors.

1:10 PM - 1:20 PM
BEC 3.0: Deepfakes, Voice Clones, and the Next $1 Billion Fraud

Email fraud is evolving fast—and it’s getting harder to spot.

1:20 PM - 1:30 PM
BEC 3.0: Deepfakes, Voice Clones, and the Next $1 Billion Fraud

Email fraud is evolving fast—and it’s getting harder to spot.

1:30 PM - 1:40 PM
BEC 3.0: Deepfakes, Voice Clones, and the Next $1 Billion Fraud

Email fraud is evolving fast—and it’s getting harder to spot.

10:45 AM - 11:15 AM
From Email to Everywhere: Stopping Threats Across Digital Channels

While email remains the primary threat vector, attackers are increasingly exploiting digital channels like Teams, Slack, and Zoom to target users.

11:20 AM - 11:50 AM
Improving Email Deliverability: From Users to Applications

Organizations today rely heavily on email—whether sent by users or applications, hosted in the cloud or on-premises.

12:35 PM - 12:45 PM
Email Authentication: What the Future Holds

Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis.

12:45 PM - 12:55 PM
Email Authentication: What the Future Holds

Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis.

12:55 PM - 1:05 PM
Email Authentication: What the Future Holds

Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis.

1:10 PM - 1:20 PM

Session to be announced

1:20 PM - 1:30 PM

Session to be announced

1:30 PM - 1:40 PM

Session to be announced

10:45 AM - 11:15 AM
Time to Shift to Modern Human-Centric DLP

Now is the time to shift to modern, human-centric DLP.

11:20 AM - 11:50 AM
Guardrails for GenAI: A Data Security Playbook

GenAI tools, such as ChatGPT and Microsoft Copilot, are accelerating productivity and innovation, but not without risk.

12:35 PM - 12:45 PM
Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Bring your toughest cloud data security challenges to our DSPM experts.

12:45 PM - 12:55 PM
Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Bring your toughest cloud data security challenges to our DSPM experts.

12:55 PM - 1:05 PM
Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Bring your toughest cloud data security challenges to our DSPM experts.

1:10 PM - 1:20 PM
Mastering a Hybrid Approach to Email DLP

Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks.

1:20 PM - 1:30 PM
Mastering a Hybrid Approach to Email DLP

Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks.

1:30 PM - 1:40 PM
Mastering a Hybrid Approach to Email DLP

Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks.

10:45 AM - 11:15 AM
A Roadmap for Human Risk Resilience via Insight, Automation & Contextual Learning

Get visibility into Proofpoint Human-centric security roadmap highlighting the use of AI, automated workflows, and integrations between Human Risk Explorer and ZenGuide.

11:20 AM - 11:50 AM
Operationalizing Human Risk Data to Drive Behavior Change

What does it mean to be a high-risk user?

12:35 PM - 12:45 PM
From Awareness to Action with Proofpoint's Maturity Model

Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk.

12:45 PM - 12:55 PM
From Awareness to Action with Proofpoint's Maturity Model

Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk.

12:55 PM - 1:05 PM
From Awareness to Action with Proofpoint's Maturity Model

Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk.

1:10 PM - 1:20 PM
Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning.

1:20 PM - 1:30 PM
Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning.

1:30 PM - 1:40 PM
Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning.

11:50 AM - 12:35 PM
1:45 PM - 2:00 PM

Farewell Closing Message

Add to calendar

*subject to changes

Learning tracks
Dedicated content

Transform human risk into resilience

Powerful tracks designed to help you maximize your cybersecurity investment

Core tracks

Maximize: Email Protection

Explore the latest changes in the email threat landscape and how Proofpoint customers stay ahead of attackers. Grab your front-row seat to evolving best practices, and get a preview into our email protection innovation roadmap featuring agentic AI to power up your SOC.

Stop: Human-centric Threats

Discover how attackers execute sophisticated, multichannel, multistage attacks that extend beyond email. Secure your spot to explore effective security measures, new feature enhancements, and peer-driven best practices for stopping human-centric threats with a comprehensive defense.

Transform: Data Security

Data exfiltration, exposure, and insider threats put sensitive information at risk. Protecting your organization’s most valuable data across cloud, endpoint, and email is a human-centric challenge.

Empower: Secure Behavior and Culture

Empowering the people within your organization to be part of the security solution was once just a dream. Now it is reality. Discover the perfect balance between people and technology.

2025 Speakers
Featured speakers

Hear directly from the best in the business.
All in one place.

Sumit

Sumit Dhawan

Chief Executive Officer, Proofpoint

Ryan Kalember

Ryan Kalember

Chief Strategy Officer, Proofpoint

asdf

Molly McLain Sterling

Senior Director, Global Cybersecurity Strategists

Who should attend
You belong here

Great defense requires elite defenders—like you. Protect 2025 serves:

Security Analysts and Engineers

Security Analysts and Engineers

System and Network Admins

Systems
 and Network Admins

Researchers and Threat Analysts

Researchers and Threat Analysts

CISOs and Security Leadership

CISOs and Security Leadership

From front-line defenders to strategic visionaries: Secure your future when learning about what's next.

Need help justifying your trip?
Download our business justification letter as a template for your business case.

Protect 2025 | Day 1

Customer Meetings

Time: 1:00 PM - 4:00 PM

Meet with Proofpoint executives and product leaders. Share your priorities, get expert insights and practical guidance to help you reach your cyber security goals.

Protect is the perfect opportunity to engage in tailored discussions with Proofpoint executives and product leaders for insights into your data and winning strategies that intersect with your top security priorities. Connect with the people that can address your concerns and help you grow your business.

Meetings can be pre-scheduled via a member of your account team or scheduled on-site at the Meeting Center reception desk, pending meeting availability. Please reach out to your account representative today or email protect@proofpoint.com to learn more.

Global Partner Summit

Time: 1:00 PM - 4:00 PM

Calling all partners - don't miss out on your exclusive opportunity to connect with Proofpoint channel leaders, our executive team, and partner community as we align on strategy, innovation, and shared success. 

At Proofpoint, we're AI Drive.  Partner Empowered.  This Partner Summit is all about you - our partners - and the powerful role you play in protecting people and data around the world.  We can't wait to see you at Proofpoint Protect 2025!

Protect 2025 | Day 1

Proofpoint’s Women Who Cyber and AWS presents: Inflence - Above and Beyond

Time: 2:00 PM - 4:00 PM

No matter your role, whether you're a practitioner, manager, or CISO, your ability to influence upward is a critical skill.  This hands-on workshop is designed for anyone looking to strengthen their executive communication and drive meaningful change at levels above their own.

From making the case for resources to shaping strategic decisions, how you deliver your message can be just as important as what you say.  In this interactive session, you'll hear from security and business leaders who've navigated high-stakes conversations and learn how to craft messages that resonate with diverse leadership audiences, technical or not.  

Join peers from across the industry to explore what works (and what doesn't) when communicating across the leadership spectrum.  You'll leave with practical tools to evaluate your presence, manage tough questions with confidence, and lead with influence - wherever you are in your career.

This session is open to all participants ready to lead from where they stand, regardless of title, background, or gender identity. 

 

Protect 2025 | Day 1

Welcome Reception

Time: 4:00 PM - 6:00 PM

Kick off your Proofpoint Protect 2025 experience at our Welcome Reception—an evening designed to spark connection, conversation, and community. Hosted by Proofpoint, this relaxed networking event brings together cybersecurity professionals, industry leaders, and fellow attendees for drinks, light bites, and great company. Whether you’re reconnecting with familiar faces or meeting peers for the first time, this is your chance to start the week on a high note. We can’t wait to welcome you!

Protect 2025 | Day 2

First-Timer Breakfast

Time: 7:00 AM - 9:00 AM

New to Proofpoint Protect? Join us during our First-Timer Breakfast on September 23—an exclusive event designed to welcome newcomers and kickstart your conference experience with confidence. This relaxed, informal gathering offers the perfect opportunity to connect with fellow first-time attendees, meet members of the Proofpoint team, and get insider tips on how to make the most of your time at Proofpoint Protect. You’ll gain a clear understanding of the agenda, learn how to navigate the event, and begin building meaningful connections before the conference is in full swing. Start your Proofpoint Protect journey with a warm welcome and a head start. We can’t wait to meet you!

Protect 2025 | Day 2

Opening Keynote

The Next Chapter: Human-Centric, AI-Driven Security

Time: 9:00 AM - 10:05 AM

Speaker: Sumit Dhawan, CEO

Join CEO Sumit Dhawan as he shares a bold vision for securing both the human and the digital human in an AI-driven world. Learn how a single, integrated platform can reduce risk, drive outcomes, and empower defenders at every level — with major announcements that redefine what’s possible. This is where the next chapter of Human-Centric, AI-Driven security begins.

Protect 2025 | Day 2

CISO Panel

Time: 10:20 AM - 10:55 AM

Speakers:

  • Blake Sallé, Chief Revenue Office, Proofpoint
  • Pat Joyce, Global Resident Chief Information Security Officer, Proofpoint
  • Guest speakers to be announced 

 

CISO Panel: Human-Centric Leadership in an AI-Driven Threat Landscape

Join Chief Revenue Officer Blake Sallé as he moderates a thought-provoking discussion with CISOs from across our customer community. This panel will dive into how security leaders are evolving their strategies in response to AI-driven threats, while remaining grounded in human-centric values. From empowering teams to making ethical AI decisions, hear how these CISOs are navigating the complex balance of innovation, trust, and resilience in a rapidly changing cyber landscape.

 

Roadmap Session 

Time: 11:00 AM - 12:00 PM

Speakers:

Mayank Choudhary, EVP & GM, Information Protection, Cloud Security & Compliance Products Group

Tom Corn, EVP & GM, Threat Protection Products Group

Roadmap Session: From Vision to Reality: The Proofpoint Platform Roadmap 

Building on the bold vision shared in "The Next Chapter: Human-Centric, AI-Driven Security", this session dives into the strategic roadmap that will bring that vision to life. Join Proofpoint product leaders as they unveil upcoming innovations across our human-centric security platform to stop threats and protect data. Learn what's coming next, how it aligns with your organization's needs, and how you can prepare to take full advantage of the future of cybersecurity. 

Protect 2025 | Day 2

Building a High-Efficiency Email SOC: Lessons from the Field

Time: 1:00 PM - 1:30 PM

Speaker(s): Coming soon

Too many security teams are stuck in reactive mode when responding to email threats. Some Proofpoint customers are charting a different course. In this session, you’ll hear from security leaders who transformed their SOC by connecting Proofpoint with their broader SecOps ecosystem — including SIEM, SOAR, SASE, XDR, and identity tools — to enable faster triage, deeper correlation, and automated response. You’ll walk away with practical recommendations for building a more efficient email SOC.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Streamlining SOC Operations with Agentic AI: Roadmap

Time: 1:35 PM - 2:05 PM

Speaker(s): Coming soon

Agentic AI is reshaping how products think, act, and deliver value. In this breakout session, we’ll dive into our product roadmap and how we’re integrating agentic AI to drive smarter automation, proactive decision-making, and more intuitive user experiences. Get a first look at what’s coming next—and how it will unlock powerful new capabilities for you.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Protection in an M365-First World: Data That Drives the Decision

Time: 2:35 PM - 2:45 PM

Speaker(s): Coming soon

Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value, and demonstrated how Proofpoint's human-centric approach matters to the business.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Protection in an M365-First World: Data That Drives the Decision

Time: 2:45 PM - 2:55 PM

Speaker(s): Coming soon

Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value, and demonstrated how Proofpoint's human-centric approach matters to the business.

CPE Credits: Coming soon

Protect 2025 | Day 2

Proofpoint Protection in an M365-First World: Data That Drives the Decision

Time: 2:55 PM - 3:05 PM

Speaker(s): Coming soon

Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value, and demonstrated how Proofpoint's human-centric approach matters to the business.

CPE Credits: Coming soon

Protect 2025 | Day 2

Revolutionizing Your SOC Investigations with Threat Protection Workbench

Time: 3:10 PM - 3:20 PM

Speaker(s): Coming soon

Threat Protection Workbench is a game-changer for SOC analysts. In this session, we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Revolutionizing Your SOC Investigations with Threat Protection Workbench

Time: 3:20 PM - 3:30 PM

Speaker(s): Coming soon

Threat Protection Workbench is a game-changer for SOC analysts. In this session, we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.

CPE Credits: Coming soon

Protect 2025 | Day 2

Revolutionizing Your SOC Investigations with Threat Protection Workbench

Time: 3:30 PM - 3:45 PM

Speaker(s): Coming soon

Threat Protection Workbench is a game-changer for SOC analysts. In this session, we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.

CPE Credits: Coming soon

Protect 2025 | Day 2

Reducing Risk and Taming Complexity with an Integrated Platform

Time: 1:00 PM - 1:30 PM

Speaker(s): Coming soon

More tools often mean more complexity—and more risk. As threats grow and environments expand, point solutions can’t keep up. In this session, we’ll explore the challenges of managing fragmented point solutions and discuss how an integrated platform approach streamlines operations, strengthens defenses and delivers better security outcomes with lower TCO.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2: Defend Against Two Sides of Account Compromise

Defend Against Two Sides of Account Compromise

Time: 1:35 PM - 2:05 PM

Speaker(s): Coming soon

As the digital workspace expands, account compromise is becoming increasingly inevitable. Attackers are also shifting tactics—targeting your suppliers and business partners to reach your employees. Learn about the strategies and essential capabilities needed to effectively defend against these evolving threats.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Time: 2:35 PM - 2:45 PM

Speaker(s): Coming soon

Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Time: 2:45 PM - 2:55 PM

Speaker(s): Coming soon

Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.

CPE Credits: Coming soon

Protect 2025 | Day 2

Shifting to Offense: A Proactive Strategy to Combat Impersonation Attacks

Time: 2:55 PM - 3:05 PM

Speaker(s): Coming soon

Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.

CPE Credits: Coming soon

Protect 2025 | Day 2

From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Time: 3:10 PM - 3:20 PM

Speaker(s): Coming soon

Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Time: 3:20 PM - 3:30 PM

Speaker(s): Coming soon

Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.

CPE Credits: Coming soon

Protect 2025 | Day 2

From Phish to Fallout: The Lifecycle and Impact of Account Takeover Attacks

Time: 3:30 PM - 3:45 PM

Speaker(s): Coming soon

Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.

CPE Credits: Coming soon

Protect 2025 | Day 2

Making Unified Data Security a Reality with Proofpoint

Time: 1:00 PM - 1:30 PM

Speaker(s): Coming soon

As defenders of your organization’s data, you know how disconnected tools and manual processes can make it challenging to secure your sensitive information. Join this session for practical guidance from Proofpoint experts and practitioners on how to build a unified, AI-driven data security program to protect against data exfiltration, exposure, and insider threats.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Stop Insider Risks Before They Become Headlines

Time: 1:35 PM - 2:05 PM

Speaker(s): Coming soon

Most organizations address insider risk only after the damage has been done. Learn how early identification and behavioral monitoring can shift your strategy from reactive to proactive. This session examines real-world scenarios involving careless users and malicious insiders, highlighting how a comprehensive approach can mitigate risk before incidents occur.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Data Security Innovations You Shouldn't Miss

Time: 2:35 PM - 2:45 PM

Speaker(s): Coming soon

Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint Data Security Innovations You Shouldn't Miss

Time: 2:45 PM - 2:55 PM

Speaker(s): Coming soon

Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!

CPE Credits: Coming soon

Protect 2025 | Day 2

Proofpoint Data Security Innovations You Shouldn't Miss

Time: 2:55 PM - 3:05 PM

Speaker(s): Coming soon

Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!

CPE Credits: Coming soon

Protect 2025 | Day 2

Proofpoint for Proofpoint: Securing Enterprise AI

Time: 3:10 PM - 3:20 PM

Speaker(s): Coming soon

As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Proofpoint for Proofpoint: Securing Enterprise AI

Time: 3:20 PM - 3:30 PM

Speaker(s): Coming soon

As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.

CPE Credits: Coming soon

Protect 2025 | Day 2

Proofpoint for Proofpoint: Securing Enterprise AI

Time: 3:30 PM - 3:45 PM

Speaker(s): Coming soon

As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.

CPE Credits: Coming soon

Protect 2025 | Day 2

Fusing Threat Intelligence with Targeted Risk Education

Time: 1:35 PM - 2:05 PM

Speaker(s): Coming soon

As AI empowers attackers to craft more convincing phishing lures at scale, traditional training methods are no longer enough. In today’s dynamic threat landscape, security teams need smarter, more adaptive ways to prepare users for evolving attack tactics. Join our experts to discover how threat intelligence can elevate your program—enhancing learner engagement, changing user behavior, and driving measurable improvements in organizational resilience.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

Time: 2:35 PM - 2:45 PM

Speaker(s): Coming soon

The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

Time: 2:45 PM - 2:55 PM

Speaker(s): Coming soon

The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.

CPE Credits: Coming soon

Protect 2025 | Day 2

Transforming Behavior & Culture: The Power of Advocacy and Everyday Engagement

Time: 2:55 PM - 3:05 PM

Speaker(s): Coming soon

The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.

CPE Credits: Coming soon

Protect 2025 | Day 2

Security Culture in the Real World: Stories That Inspire Action

Time: 3:10 PM - 3:20 PM

Speaker(s): Coming soon

Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 2

Security Culture in the Real World: Stories That Inspire Action

Time: 3:20 PM - 3:30 PM

Speaker(s): Coming soon

Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.

CPE Credits: Coming soon

Protect 2025 | Day 2

Security Culture in the Real World: Stories That Inspire Action

Time: 3:30 PM - 3:45 PM

Speaker(s): Coming soon

Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.

CPE Credits: Coming soon

Protect 2025 | Day 2

Travel to Nashville Nights

Time: 5:30 PM - 6:00 PM

Shuttle transportation will be provided to the evening event, giving you time to drop off your bags and freshen up after a full day at the conference. Hop on board and relax as we take care of getting you there comfortably and on time.

Protect 2025 | Day 2

Nashville Nights at Proofpoint Protect 2025

Time: 6:00 PM - 9:00 PM

Get ready to turn up the volume in Music City! Join us for an unforgettable night at our Nashville Nights at Proofpoint Protect 2025 — located in the heart of the iconic Broadway strip. This exclusive evening event is the perfect chance to unwind, connect, and celebrate alongside fellow customers, partners, and industry peers. With live music, Southern-inspired bites, and sweeping rooftop views, you’ll experience the true spirit of Nashville — where great conversations meet even greater country vibes. Don’t miss this high-energy highlight of the conference that blends networking with a taste of local flavor.

Protect 2025 | Day 3

Power Series Live! Navigating the Ever-Evolving Threat Landscape

Time: 9:00 AM - 10:30 AM

Speakers(s):

Guest Speaker: TBC

Ryan Kalember, Chief Strategy Officer, Proofpoint, Inc. (Host)

Daniel Blackford, Sr. Director, Threat Research, Proofpoint, Inc.

Cristiana Kittner, Sr. Manager, Threat Research, Proofpoint, Inc.

With trillions of email and cloud-based attacks occurring annually, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.

Join us for a special edition of the Proofpoint Power Series, broadcast live from Protect 2025 in Nashville. This session will feature insights from leaders in our Threat Research program as they explore the current state of the threat landscape and what it takes to stay ahead of adversaries. From espionage and cybercrime to the growing role of AI, one truth remains constant: people are at the center of today’s cybersecurity challenges.

Topics will include:

  • The ever-evolving threat landscape: what’s changed and what’s stayed the same in 2025
  • The increasingly blurred lines between cybercrime and nation-state actors
  • The national security implications of AI, one year later

With industry-leading visibility into malicious activity, Proofpoint protects customers from billions of email, cloud, SMS, and insider threats every year. Don’t miss this opportunity to hear from the experts shaping the future of cybersecurity.

CPE Credit Eligibility
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in this session.

This session qualifies for 1.5 CPE credits, based on a total instructional time of 90 minutes. CPE credits are calculated using a 50-minute hour in accordance with NASBA/AICPA standards.

Please note:

  • Certificates will not be issued for this session.
  • It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
  • Supporting materials such as session descriptions and agendas may be used for self-reporting.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 3

Maximize the Full Potential of Core Email Protection

Time: 10:45 AM - 11:15 AM

Misconfigurations in email security setups can quietly create gaps that attackers exploit—especially in Microsoft 365 and hybrid environments. We’ll walk through the most common missteps organizations make, like missing a key setting in M365 that allows direct delivery, incorrect relay permissions, or firewall rules that let unwanted traffic through. We’ll share real-world examples to show how to identify issues that can lead to big risks—and how to fix them quickly. You'll come away with practical tips to boost protection without added complexity.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 | Day 3

Inside Nexus: How Proofpoint Uses AI to Stop Email Threats

Time: 11:20 AM - 11:50 AM

Get an inside look at the AI-powered defenses built into Proofpoint products. Learn how our models detect threats in real time—and how these innovations protect your users across every email. Get an early look at upcoming Nexus detection innovations.

Protect 2025 I Day 3

2025 in Email Threats: What Hit, What Hurt, What’s Next

Time: 12:35 PM - 12:45PM

Speaker(s): Coming soon

We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

2025 in Email Threats: What Hit, What Hurt, What’s Next

Time: 12:45PM - 12:55 PM

Speaker(s): Coming soon

We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.

CPE Credits: Coming soon

Protect 2025 I Day 3

2025 in Email Threats: What Hit, What Hurt, What’s Next

Time: 12:55 PM - 1:05 PM

Speaker(s): Coming soon

We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.

CPE Credits: Coming soon

Protect 2025 I Day 3

BEC 3.0: Deepfakes, Voice Clones, and the Next $1 Billion Fraud

Time: 1:10 PM - 1:20 PM

Speaker(s): Coming soon

Email fraud is evolving fast—and it’s getting harder to spot. In this session, we’ll break down the next wave of emerging attacks, blending front-line threat research with real-world customer cases. From the use of AI to identity spoofing, today’s attackers are using new tools to exploit trust in ways we’ve never seen before. You’ll leave with a clear picture of where threats are headed, and how to future-proof your defenses for 2026 and beyond.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

BEC 3.0: Deepfakes, Voice Clones, and the Next $1 Billion Fraud

Time: 1:20 PM - 1:30 PM

Speaker(s): Coming soon

Email fraud is evolving fast—and it’s getting harder to spot. In this session, we’ll break down the next wave of emerging attacks, blending front-line threat research with real-world customer cases. From the use of AI to identity spoofing, today’s attackers are using new tools to exploit trust in ways we’ve never seen before. You’ll leave with a clear picture of where threats are headed, and how to future-proof your defenses for 2026 and beyond.

CPE Credits: Coming soon

Protect 2025 I Day 3

BEC 3.0: Deepfakes, Voice Clones, and the Next $1 Billion Fraud

Time: 1:30 PM - 1:40 PM

Speaker(s): Coming soon

Email fraud is evolving fast—and it’s getting harder to spot. In this session, we’ll break down the next wave of emerging attacks, blending front-line threat research with real-world customer cases. From the use of AI to identity spoofing, today’s attackers are using new tools to exploit trust in ways we’ve never seen before. You’ll leave with a clear picture of where threats are headed, and how to future-proof your defenses for 2026 and beyond.

CPE Credits: Coming soon

Protect 2025 I Day 3

From Email to Everywhere: Stopping Threats Across Digital Channels

Time: 10:45 AM - 11:15 AM

Speaker(s): Coming soon

While email remains the primary threat vector, attackers are increasingly exploiting digital channels like Teams, Slack, and Zoom to target users. Join this session as our experts and customers discuss the sophisticated tactics observed across these platforms—and share effective security controls to help you stay ahead of the evolving attack surface.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Improving Email Deliverability: From Users to Applications

Time: 11:20 AM - 11:50 AM

Speaker(s): Coming soon

Organizations today rely heavily on email—whether sent by users or applications, hosted in the cloud or on-premises. As they navigate challenges like cloud migration, end-of-life for legacy Exchange environments, evolving security threats, and DMARC compliance, ensuring reliable email deliverability has become increasingly complex. Join this session as our experts break down the key elements for improving deliverability across both user- and application-generated email while ensuring clean, trusted email traffic.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Email Authentication: What the Future Holds

Time: 12:35 PM - 2:45 PM

Speaker(s): Coming soon

Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Email Authentication: What the Future Holds

Time: 12:45 PM - 12:55 PM

Speaker(s): Coming soon

Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.

CPE Credits: Coming soon

Protect 2025 I Day 3

Email Authentication: What the Future Holds

Time: 12:55 PM - 1:05 PM

Speaker(s): Coming soon

Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.

CPE Credits: Coming soon

Protect 2025 I Day 3

Time to Shift to Modern Human-Centric DLP

Time: 10:45 AM - 11:15 AM

Speaker(s): Coming soon

Now is the time to shift to modern, human-centric DLP. Learn how Proofpoint’s adaptive, AI-driven solutions unify content and behavior insights—identifying sensitive data, monitoring risky actions, and dynamically adjusting controls. Gain practical guidance on how to evaluate alternatives, transition from legacy DLP solutions, expand your program without increasing headcount, and communicate the value of your program to management and the board.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Guardrails for GenAI: A Data Security Playbook

Time: 11:20 AM - 11:50 AM

Speaker(s): Coming soon

GenAI tools, such as ChatGPT and Microsoft Copilot, are accelerating productivity and innovation, but not without risk. As employees use these tools to streamline tasks and build applications, sensitive data can be unintentionally exposed or misused. This session shares actionable strategies for governing Copilot and managing Shadow AI risks, enabling everyone, from knowledge workers to developers, to use AI safely.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Time: 12:35 PM - 12:45 PM

Speaker(s): Coming soon

Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Time: 12:45 PM - 12:55 PM

Speaker(s): Coming soon

Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.

CPE Credits: Coming soon

Protect 2025 I Day 3

Ask the DSPM Experts: Securing Your Cloud Data Stores and Lakes

Time: 12:55 PM - 1:05 PM

Speaker(s): Coming soon

Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.

CPE Credits: Coming soon

Protect 2025 I Day 3

Mastering a Hybrid Approach to Email DLP

Time: 1:10 PM - 1:20 PM

Speaker(s): Coming soon

Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Mastering a Hybrid Approach to Email DLP

Time: 1:20 PM - 1:30 PM

Speaker(s): Coming soon

Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.

CPE Credits: Coming soon

Protect 2025 I Day 3

Mastering a Hybrid Approach to Email DLP

Time: 1:30 PM - 1:40 PM

Speaker(s): Coming soon

Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.

CPE Credits: Coming soon

Protect 2025 I Day 3

A Roadmap for Human Risk Resilience via Insight, Automation & Contextual Learning

Time: 10:45 AM - 11:15 AM

Speaker(s): Coming soon

Get visibility into Proofpoint Human-centric security roadmap, highlighting the use of AI, automated workflows, and integrations between Human Risk Explorer and ZenGuide. Innovations that identify at-risk employees and deliver contextual learning experiences that result in strengthened resilience against today’s human-centric threat landscape. This session will demonstrate these capabilities in the context of a security admin and end-user experience that combines detection of human risk trends, adaptive risk-based delivery of content, contextual education based on user choice, and measurement of behavior change and risk reduction.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Operationalizing Human Risk Data to Drive Behavior Change

Time: 11:20 AM - 11:50 AM

Speaker(s): Coming soon

What does it mean to be a high-risk user? This session will help you answer that and more. Learn best practices for building meaningful risk profiles using key risk attributes like threat exposure, vulnerability to phishing, data handling behaviors, and user privilege. We’ll discuss how to interpret and act on these insights by aligning profiles with targeted training, user notifications, simulations, and assessments so you can drive real behavior change where it matters most.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

From Awareness to Action with Proofpoint's Maturity Model

Time: 12:35 PM - 12:45 PM

Speaker(s): Coming soon

Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

From Awareness to Action with Proofpoint's Maturity Model

Time: 12:45 PM - 12:55 PM

Speaker(s): Coming soon

Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.

CPE Credits: Coming soon

Protect 2025 I Day 3

From Awareness to Action with Proofpoint's Maturity Model

Time: 12:55 PM - 1:05 PM

Speaker(s): Coming soon

Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.

CPE Credits: Coming soon

Protect 2025 I Day 3

Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Time: 1:10 PM - 1:20 PM

Speaker(s): Coming soon

Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.

CPE Credit Eligibility: 
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.

To receive CPE credit for a specific track:

  • Attend at least two (2) sessions within the same track to qualify for 1.0 CPE credit
  • Attend three (3) sessions within the same track to qualify for 1.5 CPE credits


CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.

Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.

For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs

Protect 2025 I Day 3

Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Time: 1:20 PM - 1:30 PM

Speaker(s): Coming soon

Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.

CPE Credits: Coming soon

Protect 2025 I Day 3

Shaping Tomorrow: Using AI to Scale and Elevate Your Program

Time: 1:30 PM - 1:40 PM

Speaker(s): Coming soon

Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.

CPE Credits: Coming soon

Protect 2025

Maximize: Email Protection

Core Email Protection

Threat actors are still using email as the number one threat vector, but now they’re making it personal. If BEC, ransomware, and phishing attacks have you down, then this track is for you. Discover how Agentic AI can power up your SOC to stop advanced email threats. Whether you are augmenting your productivity suite, have a need for speed with API deployments, or want rich comprehensive protections through a Secure Email Gateway, this track will explore the flexibility that Proofpoint offers. Don’t forget to look under the hood of the engine that powers it all, mitigating risks with AI and threat intelligence.

  • Learn how to stop targeted attacks directed at your people
  • Reveal how to use Agentic AI to be a force multiplier for your SOC
  • Explore Proofpoint’s deployment flexibility with API and SEG
  • Discover how to mitigate risks with AI and threat intelligence
Protect 2025

Stop: Human-centric Threats

Prime Threat Protection

Feel like you are overspending on a bunch of fragmented point products that don’t talk to each other? Worried about attackers taking advantage of the ever-expanding digital workspace? Do you shudder at the thought of brand reputation damage, supply chain attacks, and account takeover? Fear no more. This track will dive into a comprehensive approach to stopping human-centric threats for today and tomorrow’s landscape. Explore a broad array of human-centric security protections that can empower organizations to maximize threat prevention and reduce most risk.

  • Discover how to protect your users beyond email
  • Explore ways to protect your brand from impersonation attacks
  • Learn how to defend against compromised supplier accounts
  • Dive into multilayered protection against multichannel, multistage attacks
Protect 2025

Transform: Data Security

Data Security, Posture, and Governance

Whether it is unintentional data leaks or malicious data theft, protecting your organization’s crown jewels and sensitive data is a human-centric challenge. Is it misdirected emails and emails to unauthorized accounts keeping you awake at night? Are you daydreaming of safeguarding data from malicious, careless and compromised insiders? How are you stopping GenAI data loss and account takeover?

  • Accelerate the maturity of your DLP programs with GenAI
  • Explore automated detection and remediation of insider threats
  • Dive into mitigating identity risks, lateral movement, and privileged escalations
  • Learn how to discover, assess, and strengthen your data at rest security posture
  • Discover the best approach for strong data governance within your organization
Protect 2025

Empower: Secure Behavior and Culture

Empower: Secure Behavior and Culture

When people get tired, rushed, and stressed it’s no surprise that they make mistakes operationally and in judgement. Threat actors are keen to take advantage of this. What if you could go beyond compliance-based awareness to drive true behavior change and build a security-minded culture? Empowering the people within your organization to be part of the security solution was once just a dream. Now it is reality.

  • Learn how to grow your program without burning out
  • Focus on engaging and empowering high-risk individuals
  • Explore insights on behavior change and security culture
  • Dive into building resilience against emerging threats
Protect 2025 | Speaker Bios

Sumit Dhawan

Chief Executive Officer

As CEO of Proofpoint, Sumit Dhawan leads a global workforce of over 4,500 employees focused on defending organizations from advanced cyber threats and compliance risks by protecting their people—and in turn, safeguarding their data, business, and reputation. A seasoned executive with a proven track record, Mr. Dhawan brings over 25 years of experience in building category-leading, scaled enterprise software companies and businesses. Sumit previously served as VMware’s President, where he was responsible for driving over $13B of revenue for the company and led go-to-market functions including worldwide sales, customer success and experience, strategic ecosystem, industry solutions, marketing, and communications. He also previously served as Chief Customer Experience Officer, managing global teams responsible for professional services, technical support, and customer success. Before that, Mr. Dhawan was chief executive officer of Instart, a cybersecurity business delivering innovations in web application performance and security services and held senior executive and general management roles at Citrix.

Mr. Dhawan is a strong advocate for delivering an exceptional experience to customers and partners. He is passionate about building diverse teams and fostering inclusive cultures and equitable environments that bring out the best in everyone. Mr. Dhawan holds an MBA from the Warrington College of Business at the University of Florida, an MS in Computer Science from the University of Minnesota, and a BS in Computer Science from the Indian Institute of Technology (IIT).

Protect 2025 | Speaker Bios

Ryan Kalember

Chief Strategy & Marketing Officer

With over 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy and marketing for Proofpoint and is a sought-after expert for commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people.

Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

Protect 2025 | Speaker Bios

Molly McLain Sterling

Senior Director, Global Cybersecurity Strategists

Molly champions human-centric security and culture, helping organizations build resilience through behavioral insights and smarter alignment of people and technology.

Protect 2025 | Speaker Bios

Blake P. Sallé

Chief Revenue Officer

Blake P. Sallé is the Chief Revenue Officer at Proofpoint, where he leads the company’s global customer-facing and go-to-market functions. With nearly 30 years of experience, Mr. Sallé has a strong background in building strategic sales, customer success, routes to market, and field operations initiatives that drive momentum, growth, and revenue across international markets.

Before joining Proofpoint in 2017, he served as President of Kony, the leading provider of enterprise mobility solutions. Mr. Sallé has also held senior leadership positions at some of the most recognized and innovative organizations in technology and healthcare such as Cisco, VCE, VMware, EMC, Johnson & Johnson, DXC, PTC, and an Andreessen Horowitz-backed start-up acquired by RSA. Mr. Sallé holds a bachelor’s degree from the University of Texas at Austin.

Protect 2025 | Speaker Bios

Pat Joyce

Global Resident Chief Information Security Officer, Proofpoint

Coming soon