Join us for a forward-looking itinerary packed with the learnings and networking you'll need to stay ahead.
With trillions of email and cloud-based attacks occurring annually, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.
Add to calendar*subject to changes
Powerful tracks designed to help you maximize your cybersecurity investment
Explore the latest changes in the email threat landscape and how Proofpoint customers stay ahead of attackers. Grab your front-row seat to evolving best practices, and get a preview into our email protection innovation roadmap featuring agentic AI to power up your SOC.
Discover how attackers execute sophisticated, multichannel, multistage attacks that extend beyond email. Secure your spot to explore effective security measures, new feature enhancements, and peer-driven best practices for stopping human-centric threats with a comprehensive defense.
From front-line defenders to strategic visionaries: Secure your future when learning about what's next.
Need help justifying your trip?
Download our business justification letter as a template for your business case.
Location: Magnolia Mezzanine 2 - 4
Format: Interactive, self-paced cybersecurity training
No instructors. No scheduling. Just hands-on learning.
Threat Protection
Outsmart attackers with real-world phishing, BEC, and ransomware scenarios. Learn to operationalize and respond to live attack simulations.
Protect sensitive data across email, cloud, and endpoints. Detect insider threats, align with compliance, and gain practical DLP and insider risk skills.
Gamified learning: points, leaderboards, and prizes
Exclusive challenge coins for early participants
Flexible, on-demand format--learn at your own pace
Monday: 9:00 AM - 4:00 PM
Tuesday: 12:00 PM - 5:00 PM
Wednesday: 10:45 AM - 1:40 PM
Ready to level up your security skills?
Visit us at Proofpoint Protect Labs in Magnolia Mezzanine 2 - 4.
Time: 1:00 PM - 4:00 PM
Meet with Proofpoint executives and product leaders. Share your priorities, get expert insights and practical guidance to help you reach your cyber security goals.
Protect is the perfect opportunity to engage in tailored discussions with Proofpoint executives and product leaders for insights into your data and winning strategies that intersect with your top security priorities. Connect with the people that can address your concerns and help you grow your business.
Meetings can be pre-scheduled via a member of your account team or scheduled on-site at the Meeting Center reception desk, pending meeting availability. Please reach out to your account representative today or email protect@proofpoint.com to learn more.
Global Partner Summit
Time: 1:00 PM - 4:00 PM
Calling all partners - don't miss out on your exclusive opportunity to connect with Proofpoint channel leaders, our executive team, and partner community as we align on strategy, innovation, and shared success.
At Proofpoint, we're AI Driven. Partner Empowered. This Partner Summit is all about you - our partners - and the powerful role you play in protecting people and data around the world. We can't wait to see you at Proofpoint Protect 2025!
Time: 2:00 PM - 4:00 PM
No matter your role, whether you're a practitioner, manager, or CISO, your ability to influence upward is a critical skill. This hands-on workshop is designed for anyone looking to strengthen their executive communication and drive meaningful change at levels above their own.
From making the case for resources to shaping strategic decisions, how you deliver your message can be just as important as what you say. In this interactive session, you'll hear from security and business leaders who've navigated high-stakes conversations and learn how to craft messages that resonate with diverse leadership audiences, technical or not.
Join peers from across the industry to explore what works (and what doesn't) when communicating across the leadership spectrum. You'll leave with practical tools to evaluate your presence, manage tough questions with confidence, and lead with influence - wherever you are in your career.
This session is open to all participants ready to lead from where they stand, regardless of title, background, or gender identity.
Time: 4:00 PM - 6:00 PM
Kick off your Proofpoint Protect 2025 experience at our Welcome Reception—an evening designed to spark connection, conversation, and community. Hosted by Proofpoint, this relaxed networking event brings together cybersecurity professionals, industry leaders, and fellow attendees for drinks, light bites, and great company. Whether you’re reconnecting with familiar faces or meeting peers for the first time, this is your chance to start the week on a high note. We can’t wait to welcome you!
Time: 7:00 AM - 9:00 AM
New to Proofpoint Protect? Join us during our First-Timer Breakfast on September 23—an exclusive event designed to welcome newcomers and kickstart your conference experience with confidence. This relaxed, informal gathering offers the perfect opportunity to connect with fellow first-time attendees, meet members of the Proofpoint team, and get insider tips on how to make the most of your time at Proofpoint Protect. You’ll gain a clear understanding of the agenda, learn how to navigate the event, and begin building meaningful connections before the conference is in full swing. Start your Proofpoint Protect journey with a warm welcome and a head start. We can’t wait to meet you!
Step into the heart of the Protect experience at the Nexus Hub, your go-to destination for learning, networking, and hands-on engagement--all accessible through the Proofpoint Protect mobile app.
Theater Breakouts--Dive into focused sessions led by industry experts.
Spotlight Theater--Catch high-impact presentations on the latest cybersecurity innovations.
Meet the Experts--Connect one-on-one with Proofpoint specialists.
Product Demos--Get hands-on with the latest tools and technologies.
Sponsor Booths--Discover solutions from our trusted partners.
Sustainability in Action--Learn how Proofpoint is making a difference.
Proofpoint FaceOff--Test your cybersecurity knowledge in a fun, competitive format.
Breakfast/Lunch Room--Recharge and connect over meals in a dedicated space for breakfast and lunch service
Monday, September 22
4:00 PM - 6:00 PM
Tuesday, September 23
7:00 AM - 9:00 AM
12:00 PM - 4:00 PM
Wednesday, September 24
10:30 AM - 1:45 PM
Whether you're looking to learn, connect or compete, the Nexus Hub is your launchpad for a dynamic Protect experience. Use the mobile app to navigate the space, schedule sessions, and track your engagement.
Time: 9:00 AM - 10:05 AM
Speaker: Sumit Dhawan, CEO
Join CEO Sumit Dhawan as he shares a bold vision for securing both the human and the digital human in today’s AI-driven world. Discover powerful new innovations in Proofpoint’s human-centric security platform, built to stop threats, protect data, and prepare organizations for what’s next. This is where the next chapter of Human-Centric, AI-Driven security begins.
Time: 10:15 AM - 10:50 AM
Speakers:
CISO Panel: Human-Centric Leadership in an AI-Driven Threat Landscape
Join Chief Revenue Officer Blake Sallé as he moderates a thought-provoking discussion with CISOs from across our customer community. This panel will dive into how security leaders are evolving their strategies in response to AI-driven threats, while remaining grounded in human-centric values. From empowering teams to making ethical AI decisions, hear how these CISOs are navigating the complex balance of innovation, trust, and resilience in a rapidly changing cyber landscape.
Roadmap Session
Time: 10:50 AM - 12:00 PM
Speakers:
Dorothy Li, CVP, Security Copilot and Ecosystem, Microsoft
Mayank Choudhary, EVP & GM, Information Protection, Cloud Security & Compliance Products Group
Tom Corn, EVP & GM, Threat Protection Products Group
Roadmap Session: From Vision to Reality: The Proofpoint Platform Roadmap
Building on the bold vision shared in "The Next Chapter: Human-Centric, AI-Driven Security", this session dives into the strategic roadmap that will bring that vision to life. Join Proofpoint product leaders as they unveil upcoming innovations across our human-centric security platform to stop threats and protect data. Learn what's coming next, how it aligns with your organization's needs, and how you can prepare to take full advantage of the future of cybersecurity.
Time: 1:00 PM - 1:30 PM
Speaker(s):
Chirag Patel, CISO, Bottomline Technologies
Jason Ford, Principal Sales Engineer, Proofpoint
Too many security teams are stuck in reactive mode when responding to email threats. Some Proofpoint customers are charting a different course. In this session, you’ll hear from security leaders who transformed their SOC by connecting Proofpoint with their broader SecOps ecosystem — including SIEM, SOAR, SASE, XDR, and identity tools — to enable faster triage, deeper correlation, and automated response. You’ll walk away with practical recommendations for building a more efficient email SOC.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:35 PM - 2:05 PM
Speaker(s):
Dan Rapp, Chief AI and Data Officer, Proofpoint
Patrick Wheeler, Director, Product Management, Proofpoint
Agentic AI is reshaping how products think, act, and deliver value. In this breakout session, we’ll dive into our product roadmap and how we’re integrating agentic AI to drive smarter automation, proactive decision-making, and more intuitive user experiences. Get a first look at what’s coming next—and how it will unlock powerful new capabilities for you.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 2:35 PM - 2:45 PM
Speaker(s):
Nathan Dube, IT Security Manager, Viant Medical
Monica Gupta, Sr. Product Marketing Manager, Proofpoint
Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value and demonstrated how Proofpoint’s human-centric approach matters to the business.
Lightning Talk 1: Building the Business Case: A Customer's Perspective
Lightning Talk 2: Operational Evidence that Drives the Decision
Lightning Talk 3: Finding the RIght Fit - SEG or API?
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 2:45 PM - 2:55 PM
Speaker(s):
Nathan Dube, IT Security Manager, Viant Medical
Monica Gupta, Sr. Product Marketing Manager, Proofpoint
Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value, and demonstrated how Proofpoint's human-centric approach matters to the business.
Lightning Talk 1: Building the Business Case - A Customer's Perspective
Lightning Talk 2: Operational Evidence that Drives Decisions
Lightning Talk 3: Finding the Right Fit - SEG or API?
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specific track:
Attend at least two (2) sessions within the same track to qualify 1.0 CPE credits.
Attend three (3) sessions within the same track to qualify for 1.5 CPE credits.
CPE credits are calculated based on 50-minute hour in accordance with NASBA/AICPA standards. It's the attendee's responsibility to track their participation and ensure compliance with their organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting visit: https://protect2025.proofpoint.com/faqs
Time: 2:55 PM - 3:05 PM
Speaker(s):
Nathan Dube, IT Security Manager, Viant Medical
Monica Gupta, Sr. Product Marketing Manager, Proofpoint
Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value, and demonstrated how Proofpoint's human-centric approach matters to the business.
Lightning Talk 1: Building the Business Case - A Customer's Perspective
Lightning Talk 2: Operational Evidence that Drives the Decision
Lightning Talk 3: Finding the Right Fit - SEP or API?
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 3:10 PM - 3:20 PM
Speaker(s):
Neha Anand, Director, Product Marketing, Proofpoint
Jennica Brodeur, Staff Expert Customer Success Manager, Proofpoint
Threat Protection Workbench is a game-changer for SOC analysts. In this session we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.
Lightning Talk 1: Smarter, faster investigations—powered by AI and built for analysts
Lightning Talk 2: Remediation -Seamlessly manage blocklists, safelists, URLs, and hashes to stop threats at scale.
Lightning Talk 3: SOC success stories— responding with speed, clarity, and control
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 3:20 PM - 3:30 PM
Speaker(s):
Neha Anand, Director, Product Marketing, Proofpoint
Jennica Brodeur, Staff Expert Customer Success Manager, Proofpoint
Threat Protection Workbench is a game-changer for SOC analysts. In this session, we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.
Lightning Talk 1: Smarter, Faster Investigations - Powered by AI and Built for Analysts
Lightning Talk 2: Remediation - Seamlessly Manage Blocklists, Safelists, URLs, and Hashes to Stop Threats at Scale
Lightning Talk 3: SOC Success Stories: Responding with Speed, Clarity, and Control
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their partipication in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's requirements.
Please note: Certificates will not be issued. Attendees session details and agenda to self-report.
For more information on CPE eligibility and self-reporting visit https://protect25.proofpoint.com/faqs
Time: 3:30 PM - 3:45 PM
Speaker(s):
Neha Anand, Director, Product Marketing, Proofpoint
Jennica Brodeur, Staff Expert Customer Success Manager, Proofpoint
Threat Protection Workbench is a game-changer for SOC analysts. In this session, we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.
Lightning Talk 1: Smarter, Faster Investigations—Powered by AI and Built for Analysts
Lightning Talk 2: Remediation —Seamlessly Manage Blocklists, Safelists, URLs, and Hashes to Stop Threats at Scale
Lightning Talk 3: SOC Success Stories— Responding with Speed, Clarity, and Control
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Eduction (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting visit https://protect25.proofpoint.com/faqs
Time: 1:00 PM - 1:30 PM
Speaker(s):
Cheryl Tang, Sr. Director, Product Marketing, Proofpoint
More tools often mean more complexity—and more risk. As threats grow and environments expand, point solutions can’t keep up. In this session, we’ll explore the challenges of managing fragmented point solutions and discuss how an integrated platform approach streamlines operations, strengthens defenses and delivers better security outcomes with lower TCO.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:35 PM - 2:05 PM
Speaker(s):
Mary Benton, Sr. Information Security Analyst, Meijer
Greg Bowman, Security Manager, Cintas
Sara Pan, Director, Product Marketing, Proofpoint
As the digital workspace expands, account compromise is becoming increasingly inevitable. Attackers are also shifting tactics—targeting your suppliers and business partners to reach your employees. Learn about the strategies and essential capabilities needed to effectively defend against these evolving threats.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 2:35 PM - 2:45 PM
Speaker(s):
Iza Kosterkiewicz, Security Delivery Senior Manager, Accenture
Craig Temple, Staff Product Marketing Manager, Proofpoint
Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.
Lightning Talk 1: The DMARC Journey
Lightning Talk 2: Protecting Application-Generated Email
Lightning Talk 3: Leverage Domain Takedown Services
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 2:45 PM - 2:55 PM
Speaker(s):
Iza Kosterkiewicz, Security Delivery Senior Manager, Accenture
Craig Temple, Staff Product Marketing Manager, Proofpoint
Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.
Lightning Talk 1: The DMARC Journey
Lightning Talk 2: Protecting Application-Generated Email
Lightning Talk 3: Leveraging Domain Takedown Services
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility, visit https://protect25.proofpoint.com/faqs
Time: 2:55 PM - 3:05 PM
Speaker(s):
Iza Kosterkiewicz, Security Delivery Senior Manager, Accenture
Craig Temple, Staff Product Marketing Manager, Proofpoint
Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.
Lightning Talk 1: The DMARC Journey
Lightning Talk 2: Protecting Application-Generated Email
Lightning Talk 3: Leveraging Domain Takedown Services
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility, visit https://protect25.proofpoint.com/faqs
Time: 3:10 PM - 3:20 PM
Speaker(s):
Davide Canali, Director, Threat Research, Proofpoint
Yaniv Miron, Sr. Manager, Threat Research, Proofpoint
Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.
Lightning Talk 1: Pre-Account Takeover
Lightning Talk 2: Phishing in Action
Lightning Talk 3: Post-Account Takeover
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 3:20 PM - 3:30 PM
Speaker(s):
Davide Canali, Director, Threat Research, Proofpoint
Yaniv Miron, Sr. Manager, Threat Research, Proofpoint
Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.
Lightning Talk 1: Pre-Account Takeover
Lightning Talk 2: Phishing in Action
Lightning Talk 3: Post-Account Takeover
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specifc track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 3:30 PM - 3:45 PM
Speaker(s):
Davide Canali, Director, Threat Research, Proofpoint
Yaniv Miron, Sr. Manager, Threat Research, Proofpoint
Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.
Lightning Talk 1: Pre-Account Takeover
Lightning Talk 2: Phishing in Action
Lightning Talk 3: Post-Account Takeover
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Eduction (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 1:00 PM - 1:30 PM
Speaker(s):
Trey Tunnell, CISO, Floor & Decor
Ovais Shekhani, Director, IT Security Operations, AMA
Tucker Shepard, Sr. Manager, Information Security & HIPAA Security Officer, Regent Surgical
Joshua Linkenhoker, Team Lead, Staff Sales Engineer, Proofpoint
As defenders of your organization’s data, you know how disconnected tools and manual processes can make it challenging to secure your sensitive information. Join this session for practical guidance from Proofpoint experts and practitioners on how to build a unified, AI-driven data security program to protect against data exfiltration, exposure, and insider threats.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:35 PM - 2:05 PM
Speaker(s):
John Padlo, Senior Manager, Threat Intelligence, Cyber Defense Operations
Stephanie Torto, Sr. Product Marketing Manager, Proofpoint
Most organizations address insider risk only after the damage has been done. Learn how early identification and behavioral monitoring can shift your strategy from reactive to proactive. This session examines real-world scenarios involving careless users and malicious insiders, highlighting how a comprehensive approach can mitigate risk before incidents occur.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 2:35 PM - 2:45 PM
Speaker(s):
Aruna Sreeram, Sr. Director, Product Management Information Protection, Proofpoint
Curtis Wray, Staff Security Architect, Proofpoint
Andrew Hermance, Sr. Expert Customer Success Manager, Proofpoint
Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!
Lightning Talk 1: Human Risk Explorer and Dynamic Endpoint Policies
Lightning Talk 2: Nexus File Lineage
Lightning Talk 3: Advanced Detectors at the Endpoint
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 2:45 PM - 2:55 PM
Speaker(s):
Aruna Sreeram, Sr. Director, Product Management Information Protection, Proofpoint
Curtis Wray, Staff Security Architect, Proofpoint
Andrew Hermance, Sr. Expert Customer Success Manager, Proofpoint
Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!
Lightning Talk 1: Human Risk Explorer and Dynamic Endpoint Policies
Lightning Talk 2: Nexus File Lineage
Lightning Talk 3: Advanced Detectors at the Endpoint
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 2:55 PM - 3:05 PM
Speaker(s):
Aruna Sreeram, Sr. Director, Product Management Information Protection, Proofpoint
Curtis Wray, Staff Security Architect, Proofpoint
Andrew Hermance, Sr. Expert Customer Success Manager, Proofpoint
Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!
Lightning Talk 1: Human Risk Explorer and Dynamic Endpoint Policies
Lightning Talk 2: Nexus File Lineage
Lightning Talk 3: Advanced Detectors at the Endpoint
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CEP eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 3:10 PM - 3:20 PM
Speaker(s):
John Abel, SVP & Chief Information Officer, Proofpoint
JP Dinh, VP, Digital Experience & Enablement, Proofpoint
Itir Clarke, Staff Product Marketing Manager, Proofpoint
As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.
Lightning Talk 1: Secure AI Platform Configurations
Lightning Talk 2: Granular Data Access Enforcement
Lightning Talk 3: Safe Agent and Workflow Development
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 3:20 PM - 3:30 PM
Speaker(s):
John Abel, SVP & Chief Information Officer, Proofpoint
Curtis Wray, Staff Security Architect, Proofpoint
Andrew Hermance, Sr. Expert Customer Success Manager, Proofpoint
As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.
Lightning Talk 1: Secure AI Platform Configurations
Lightning Talk 2: Granular Data Access Enforcement
Lightning Talk 3: Safe Agent and Workflow Development
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibilty and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 3:30 PM - 3:45 PM
Speaker(s):
John Abel, SVP & Chief Information Officer, Proofpoint
JP Dinh, VP, Digital Experience & Enablement, Proofpoint
Itir Clarke, Staff Product Marketing Manager, Proofpoint
As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.
Lightning Talk 1: Secure AI Platform Configurations
Lightning Talk 2: Granular Data Access Enforcement
Lightning Talk 3: Safe Agent and Workflow Development
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsiblity to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 1:00 PM - 1:30 PM
Speaker(s):
Katlyn Ostrom, Cybersecurity Strategy Sr. Program Manager, Proofpoint
Paul Chavez, Sr. Product Marketing Manager, Proofpoint
This session explores how to effectively measure security behavior change at both the operational and strategic levels. You'll learn how to go beyond basic metrics like click rates and course completions to identify indicators that reflect true behavior change and risk reduction.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:35 PM - 2:05 PM
Speaker(s):
Keith Roberts, SOC Manager, Abbott
Chris Dawson, Principal Threat Intelligence Analyst, Proofpoint
Garrett Guinivan, Staff Sales Engineer, Proofpoint
As AI empowers attackers to craft more convincing phishing lures at scale, traditional training methods are no longer enough. In today’s dynamic threat landscape, security teams need smarter, more adaptive ways to prepare users for evolving attack tactics. Join our experts to discover how threat intelligence can elevate your program—enhancing learner engagement, changing user behavior, and driving measurable improvements in organizational resilience.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 2:35 PM - 2:45 PM
Speaker(s):
Michelle Stephens, Cybersecurity Education & Digital Content Specialist, Oak Ridge National Laboratory
Gretel Eagan, Services Positioning & Sales Enablement Sr. Manager, Proofpoint
The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.
Lightning Talk 1: Identifying Cultural Influences
Lightning Talk 2: Building Your Advocate Network
Lightning Talk 3: Elevating Everyday Engagement
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 2:45 PM - 2:55 PM
Speaker(s):
Michelle Stephens, Cybersecurity Education & Digital Content Specialist, Oak Ridge National Laboratory
Gretel Eagan, Services Positioning & Sales Enablement Sr. Manager
The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.
Lightning Talk 1: Identifying Cultural Influences
Lightning Talk 2: Building your Advocate Network
Lightning Talk 3: Elevating Everyday Engagement
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions:
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 2:55 PM - 3:05 PM
Speaker(s):
Michelle Stephens, Cybersecurity Education & Digital Content Specialist, Oak Ridge National Laboratory
Getel Eagan, Services Positioning & Sales Enablement Sr. Manager
The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.
Lightning Talk 1: Identifying Cultural Influences
Lightning Talk 2: Building Your Advocate Network
Lightning Talk 3: Elevating Everyday Engagement
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligiblity and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 3:10 PM - 3:20 PM
Speaker(s):
Peter Lopez-Perez, Cybersecurity Engagement Specialist, Sharp HealthCare
Lynn Harrington, Sr. Product Marketing Manager, Proofpoint
Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 3:20 PM - 3:30 PM
Speaker(s):
Peter Lopez-Perez, Cybersecurity Engagement Specialist, Sharp HealthCare
Lynn Harrington, Sr. Product Marketing Manager, Proofpoint
Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.
Lightning Talk 1: From Simulation to Education - Tailored Learning in Action
Lightning Talk 2: Introducing the Cybersecurity Personality Assessment
Lightning Talk 3: The "Game" of Shaping Behavior Change
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 3:30 PM - 3:45 PM
Speaker(s): Coming soon
Peter Lopez-Perez, Cybersecurity Engagement Specialist, Sharp HealthCare
Lynn Harrington, Sr. Product Marketing Manager, Proofpoint
Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.
Lightning Talk 1: From Simulation to Education - Tailored Learning in Action
Lightning Talk 2: Introducing the Cybersecurity Personality Assessment
Lightning Talk 3: The "Game" of Shaping Behavior Change
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 4:00 PM - 5:00 PM
Speaker(s):
Daniel Blackford, Sr. Director, Threat Research, Proofpoint
Get a behind-the-scene look at one of the most ambitious cybercrime takedowns in recent history. Proofpoint's Daniel Blackford will reveal how Operation Endgame disrupted global ransomware networks--and what happened next. From tracking threat actors like TA577 and Qbot to dismantling malware families like Smokeloader and Lockbit, this session dives into the tactics, timelines, and international coordination required to strike at the heart of cybercrime. This is your sneak peek at a session set to hit the stage at Goware and RSAC 2026--don't miss your chance to hear it first at Proofpoint Protect 2026.
Time: 5:30 PM - 6:00 PM
Shuttle transportation will be provided to the evening event, giving you time to drop off your bags and freshen up after a full day at the conference. Hop on board and relax as we take care of getting you there comfortably and on time.
Time: 6:00 PM - 9:00 PM
Get ready to turn up the volume in Music City! Join us for an unforgettable night at our Nashville Nights at Proofpoint Protect 2025 — located in the heart of the iconic Broadway strip. This exclusive evening event is the perfect chance to unwind, connect, and celebrate alongside fellow customers, partners, and industry peers. With live music, Southern-inspired bites, and sweeping rooftop views, you’ll experience the true spirit of Nashville — where great conversations meet even greater country vibes. Don’t miss this high-energy highlight of the conference that blends networking with a taste of local flavor.
Time: 9:00 AM - 10:30 AM
Speakers(s):
Speaker(s):
Chris Inglis, Former U.S. National Cyber Director
Ryan Kalember, Chief Strategy Officer, Proofpoint, Inc. (Host)
Daniel Blackford, Sr. Director, Threat Research, Proofpoint, Inc.
Cristiana Kittner, Sr. Manager, Threat Research, Proofpoint, Inc.
With trillions of email and cloud-based attacks occurring annually, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.
Join us for a special edition of the Proofpoint Power Series, broadcast live from Protect 2025 in Nashville. This session will feature insights from leaders in our Threat Research program as they explore the current state of the threat landscape and what it takes to stay ahead of adversaries. From espionage and cybercrime to the growing role of AI, one truth remains constant: people are at the center of today’s cybersecurity challenges.
Topics will include:
With industry-leading visibility into malicious activity, Proofpoint protects customers from billions of email, cloud, SMS, and insider threats every year. Don’t miss this opportunity to hear from the experts shaping the future of cybersecurity.
CPE Credit Eligibility
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in this session.
This session qualifies for 1.5 CPE credits, based on a total instructional time of 90 minutes. CPE credits are calculated using a 50-minute hour in accordance with NASBA/AICPA standards.
Please note:
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 10:45 AM - 11:15 AM
Speaker(s):
James Knight, Principal Professional Services Consultant, Proofpoint
Michael Beninda, Principal Professional Services Consultant, Proofpoint
Misconfigurations in email security setups can quietly create gaps that attackers exploit—especially in Microsoft 365 and hybrid environments. We’ll walk through the most common missteps organizations make, like missing a key setting in M365 that allows direct delivery, incorrect relay permissions, or firewall rules that let unwanted traffic through. We’ll share real-world examples to show how to identify issues that can lead to big risks—and how to fix them quickly. You'll come away with practical tips to boost protection without added complexity.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 11:20 AM - 11:50 AM
Speaker(s):
Pablo Passera, VP Product Management, Proofpoint
Get an inside look at the AI-powered defenses built into Proofpoint products. Learn how our models detect threats in real time—and how these innovations protect your users across every email. Get an early look at upcoming Nexus detection innovations.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:35 PM - 12:45PM
Speaker(s):
Cristina Kittner, Sr. Manager, Threat Research, Proofpoint
We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.
Lightning Talk 1: What Hit - Social Engineering at Scale
Lightning Talk 2: What Hurt - Exploiting Trust with Legitimate Tools
Lightning Talk 3: What's Next - Future-Proofing Against 2026 Threats
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:45PM - 12:55 PM
Speaker(s):
Cristina Kittner, Sr. Manager, Threat Research, Proofpoint
We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.
Lightning Talk 1: What Hit - Social Engineering at Scale
Lightning Talk 2: What Hurt - Exploiting Trust with Legitimate Tools
Lightning Talk 3: What's Next - Future-Proofing Against 2026 Threats
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:55 PM - 1:05 PM
Speaker(s):
Cristina Kittner, Sr. Manager, Threat Research, Proofpoint
We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.
Lightening Talk 1: What Hit - Social Engineering at Scale
Lightening Talk 2: What Hurt - Exploiting Trust with Legitimate Tools
Lightening Talk 3: What's Next - Future-Proofing Against 2026 Threats
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:10 PM - 1:20 PM
Speaker(s):
Jason Hurst, Sr. Manager, Computer Security, Panda Restaurant Group
Davide Canali, Director, Threat Research, Proofpoint
Email fraud is evolving fast—and it’s getting harder to spot. In this session, we’ll break down the next wave of emerging attacks, blending front-line threat research with real-world customer cases. From the use of AI to identity spoofing, today’s attackers are using new tools to exploit trust in ways we’ve never seen before. You’ll leave with a clear picture of where threats are headed, and how to future-proof your defenses for 2026 and beyond.
Lightning Talk 1: BEC Seen in the Wild
Lightning Talk 2: BEC by the Numbers - Data Trends and AI Tactics
Lightning Talk 3: Staying Smarter than the Latest BEC Scams
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsiblity to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 1:20 PM - 1:30 PM
Speaker(s):
Jason Hurst, Sr. Manager, Computer Security, Panda Restaurant Group
Davide Canali, Director, Threat Research, Proofpoint
Email fraud is evolving fast—and it’s getting harder to spot. In this session, we’ll break down the next wave of emerging attacks, blending front-line threat research with real-world customer cases. From the use of AI to identity spoofing, today’s attackers are using new tools to exploit trust in ways we’ve never seen before. You’ll leave with a clear picture of where threats are headed, and how to future-proof your defenses for 2026 and beyond.
Lightning Talk 1: BEC Seen in the Wild
Lightning Talk 2: BEC by the Numbers - Data Trends and AI Tactics
Lightning Talk 3: Staying Smarter than the Latest BEC Scams
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsiblity to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 10:45 AM - 11:15 AM
Speaker(s):
Jennifer L. Wood, Sr. IT Operations Engineer, Delta Air Lines
Sara Pan, Director, Product Marketing, Proofpoint
Alexis Dorais-Joncas, Sr. Manager, Threat Research
While email remains the primary threat vector, attackers are increasingly exploiting digital channels like Teams, Slack, and Zoom to target users. Join this session as our experts and customers discuss the sophisticated tactics observed across these platforms—and share effective security controls to help you stay ahead of the evolving attack surface.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 11:20 AM - 11:50 AM
Speaker(s):
Ash Valeski, Sr. SER Solutions Director
Matthew Moorehead, Director, SSA Services
Organizations today rely heavily on email—whether sent by users or applications, hosted in the cloud or on-premises. As they navigate challenges like cloud migration, end-of-life for legacy Exchange environments, evolving security threats, and DMARC compliance, ensuring reliable email deliverability has become increasingly complex. Join this session as our experts break down the key elements for improving deliverability across both user- and application-generated email while ensuring clean, trusted email traffic.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:35 PM - 2:45 PM
Speaker(s):
Kevin San Diego, VP Product Management, Sender Security & Authentication, Proofpoint
Matthew Moorehead, Director, SSA Services
Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.
Lightning Talk 1: What You Need to Know About DMARCbis
Lightning Talk 2: Emerging DKIM2 Standards Discussion
Lightning Talk 3: Changes in Email Receiver Landscape
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:45 PM - 12:55 PM
Speaker(s):
Kevin San Diego, VP Product Management, Sender Security & Authentication, Proofpoint
Matthew Moorehead, Director, SSA Services
Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.
Lightning Talk 1: What You Need to Know About DMARCbis
Lightning Talk 2: Emerging DKIM2 Standards Discussion
Lightning Talk 3: Changes in Email Receiver Landscape
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:55 PM - 1:05 PM
Speaker(s):
Kevin San Diego, VP Product Management, Sender Security & Authentication, Proofpoint
Matthew Moorehead, Director, SSA Services
Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.
Lightning Talk 1: What You Need to Know About DMARCbis
Lightning Talk 2: Emerging DKIM2 Standards Discussion
Lightning Talk 3: Changes in Email Receiver Landscape
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:10 PM - 1:20 PM
Speaker(s):
Josh Tweeten, Sr. Cyber Security Analyst, Information Technology Services Dept., Hormel Foods Corporate Services LLC
Itay Nachum, Sr. Director, Product Management, Proofpoint
Curtis Wray, Staff Security Architect, Proofpoint
Shadow SaaS and SaaS application misconfigurations are a growing source of risk in enterprises. In this session, explore how Proofpoint's SaaS and Identity Posture Management solution can help your organization discover and manage shadow SaaS usage and remediate exposures for sanctioned SaaS applications before they cause security incidents, with real-world insights from a featured customer. Discover how to harness the capabilities of the Proofpoint human-centric platform for a more intelligent, secure SaaS application ecosystem.
Lightning Talk 1: Bring Unsanctioned SaaS and identities Out of the Shadows
Lightning Talk 2: Fortify the Posture of Your Enterprise SaaS Applications
Lightning Talk 3: Strengthening SaaS security posture: A real-life example
CPE Credit Eligibility:
Attendees may be eligibile to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 1:10 PM - 1:20 PM
Speaker(s):
Josh Tweeten, Sr. Cyber Security Analyst, Information Technology Services Dept., Hormel Foods Corporate Services LLC
Itay Nachum, Sr. Director, Product Management, Proofpoint
Curtis Wray, Staff Security Architect, Proofpoint
Shadow SaaS and SaaS application misconfigurations are a growing source of risk in enterprises. In this session, explore how Proofpoint's SaaS and Identity Posture Management solution can help your organization discover and manage shadow SaaS usage and remediate exposures for sanctioned SaaS applications before they cause security incidents, with real-world insights from a featured customer. Discover how to harness the capabilities of the Proofpoint human-centric platform for a more intelligent, secure SaaS application ecosystem.
Lightning Talk 1: Bring Unsanctioned SaaS and identities Out of the Shadows
Lightning Talk 2: Fortify the Posture of Your Enterprise SaaS Applications
Lightning Talk 3: Strengthening SaaS security posture: A real-life example
CPE Credit Eligibility:
Attendees may be eligibile to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 1:30 PM - 1:40 PM
Speaker(s):
Josh Tweeten, Sr. Cyber Security Analyst, Information Technology Services Dept., Hormel Foods Corporate Services LLC
Itay Nachum, Sr. Director, Product Management, Proofpoint
Curtis Wray, Staff Security Architect, Proofpoint
Shadow SaaS and SaaS application misconfigurations are a growing source of risk in enterprises. In this session, explore how Proofpoint's SaaS and Identity Posture Management solution can help your organization discover and manage shadow SaaS usage and remediate exposures for sanctioned SaaS applications before they cause security incidents, with real-world insights from a featured customer. Discover how to harness the capabilities of the Proofpoint human-centric platform for a more intelligent, secure SaaS application ecosystem.
Lightning Talk 1: Bring Unsanctioned SaaS and identities Out of the Shadows
Lightning Talk 2: Fortify the Posture of Your Enterprise SaaS Applications
Lightning Talk 3: Strengthening SaaS security posture: A real-life example
CPE Credit Eligibility:
Attendees may be eligibile to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credits for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee's responsibility to track their participation and ensure compliance with their professional organization's reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit https://protect25.proofpoint.com/faqs
Time: 10:45 AM - 11:15 AM
Speaker(s):
Stacy Knoup, Director of Engineering, Principal Financial Group
Jeremy Wittkop, Sr. Manager, Product Evangelist Services, Proofpoint
Now is the time to shift to modern, human-centric DLP. Learn how Proofpoint’s adaptive, AI-driven solutions unify content and behavior insights—identifying sensitive data, monitoring risky actions, and dynamically adjusting controls. Gain practical guidance on how to evaluate alternatives, transition from legacy DLP solutions, expand your program without increasing headcount, and communicate the value of your program to management and the board.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 11:20 AM - 11:50 AM
Speaker(s):
Itir Clarke, Staff Product Marketing Manager, Proofpoint
GenAI tools, such as ChatGPT and Microsoft Copilot, are accelerating productivity and innovation, but not without risk. As employees use these tools to streamline tasks and build applications, sensitive data can be unintentionally exposed or misused. This session shares actionable strategies for governing Copilot and managing Shadow AI risks, enabling everyone, from knowledge workers to developers, to use AI safely.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:35 PM - 12:45 PM
Speaker(s):
Itir Clarke, Staff Product Marketing Manager, Proofpoint
James Knight, Principal Professional Services Consultant
Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.
Lightning Talk 1: Snowflake Data Access Governance
Lightning Talk 2: Abandoned Data Discovery
Lightning Talk 3: Data Classification for Cloud Data Stores
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:45 PM - 12:55 PM
Speaker(s):
Itir Clarke, Staff Product Marketing Manager, Proofpoint
James Knight, Principal Professional Services Consultant
Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.
Lightning Talk 1: Snowflake Data Access Governance
Lightning Talk 2: Abandoned Data Discovery
Lightning Talk 3: Data Classification for Cloud Data Stores
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:55 PM - 1:05 PM
Speaker(s):
Itir Clarke, Staff Product Marketing Manager, Proofpoint
James Knight, Principal Professional Services Consultant
Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.
Lightning Talk 1: Snowflake Data Access Governance
Lightning Talk 2: Abandoned Data Discovery
Lightning Talk 3: Data Classification for Cloud Data Stores
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:10 PM - 1:20 PM
Speaker(s):
Mike Olden, Senior Principal PS Consultant, Proofpoint
Vishal Patel, Sr. Sales Engineer, Proofpoint
Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.
Lightning Talk 1: The Anatomy of Email Data Exfiltration
Lightning Talk 2: Key Benefits of a Comprehensive Approach to Email DLP
Lightning Talk 3: Prescriptive Guide to Hybrid Email DLP
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:20 PM - 1:30 PM
Speaker(s):
Mike Olden, Senior Principal PS Consultant, Proofpoint
Vishal Patel, Sr. Sales Engineer, Proofpoint
Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.
Lightning Talk 1: The Anatomy of Email Data Exfiltration
Lightning Talk 2: Key Benefits of a Comprehensive Approach to Email DLP
Lightning Talk 3: Prescriptive Guide to Hybrid Email DLP
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:30 PM - 1:40 PM
Speaker(s):
Mike Olden, Senior Principal PS Consultant, Proofpoint
Vishal Patel, Sr. Sales Engineer, Proofpoint
Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.
Lightning Talk 1: The Anatomy of Email Data Exfiltration
Lightning Talk 2: Key Benefits of a Comprehensive Approach to Email DLP
Lightning Talk 3: Prescriptive Guide to Hybrid Email DLP
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 10:45 AM - 11:15 AM
Speaker(s):
Nick McClay, Sr. Director, Product Management, Proofpoint
Get visibility into Proofpoint Human-centric security roadmap, highlighting the use of AI, automated workflows, and integrations between Human Risk Explorer and ZenGuide. Innovations that identify at-risk employees and deliver contextual learning experiences that result in strengthened resilience against today’s human-centric threat landscape. This session will demonstrate these capabilities in the context of a security admin and end-user experience that combines detection of human risk trends, adaptive risk-based delivery of content, contextual education based on user choice, and measurement of behavior change and risk reduction.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 11:20 AM - 11:50 AM
Speaker(s):
Curtis Wray, Staff Security Architect, Proofpoint
Simon Pople, Sr. Product Manager, Proofpoint
What does it mean to be a high-risk user? This session will help you answer that and more. Learn best practices for building meaningful risk profiles using key risk attributes like threat exposure, vulnerability to phishing, data handling behaviors, and user privilege. We’ll discuss how to interpret and act on these insights by aligning profiles with targeted training, user notifications, simulations, and assessments so you can drive real behavior change where it matters most.
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:35 PM - 12:45 PM
Speaker(s):
Dr. Bob Hausman, Lead Cognitive Scientist, Human Risk Management, Proofpoint
Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint
Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.
Lightning Talk 1: Why Awareness Training Falls Short - and What Comes Next
Lightning Talk 2: The Science Behind Behavior Change in Cybersecurity Learning
Lightning Talk 3: Applying the Human Risk Management Maturity Model (MRM-MM)
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:45 PM - 12:55 PM
Speaker(s):
Dr. Bob Hausman, Lead Cognitive Scientist, Human Risk Management, Proofpoint
Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint
Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.
Lightning Talk 1: Why Awareness Training Falls Short - and What Comes Next
Lightning Talk 2: The Science Behind Behavior Change in Cybersecurity Learning
Lightning Talk 3: Applying the Human Risk Management Maturity Model (MRM-MM)
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 12:55 PM - 1:05 PM
Speaker(s):
Dr. Bob Hausman, Lead Cognitive Scientist, Human Risk Management, Proofpoint
Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint
Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.
Lightning Talk 1: Why Awareness Training Falls Short - and What Comes Next
Lightning Talk 2: The Science Behind Behavior Change in Cybersecurity Learning
Lightning Talk 3: Applying the Human Risk Management Maturity Model (MRM-MM)
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:10 PM - 1:20 PM
Speaker(s):
Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint
Kurt Wesco, CTO - Proofpoint Security Awareness Products, Proofpoint
Simon Pople, Sr. Product Manager, Proofpoint
Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.
Lightning Talk 1: AI-Driven Security Content Creation and Curation
Lightning Talk 2: GenAI Phish Hooks and Teachable Moments
Lightning Talk 3: Automated Risk-based Learning
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:20 PM - 1:30 PM
Speaker(s):
Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint
Kurt Wesco, CTO - Proofpoint Security Awareness Products, Proofpoint
Simon Pople, Sr. Product Manager, Proofpoint
Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.
Lightning Talk 1: AI-Driven Security Content Creation and Curation
Lightning Talk 2: GenAI Phish Hooks and Teachable Moments
Lightning Talk 3: Automated Risk-based LearningLightning Talk 1: AI-Driven Security Content Creation and Curation
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:30 PM - 1:40 PM
Speaker(s):
Kimberly Pavelich, Director, Learning Curation & Design, Proofpoint
Kurt Wesco, CTO - Proofpoint Security Awareness Products, Proofpoint
Simon Pople, Sr. Product Manager, Proofpoint
Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.
Lightning Talk 1: AI-Driven Security Content Creation and Curation
Lightning Talk 2: GenAI Phish Hooks and Teachable Moments
Lightning Talk 3: Automated Risk-based Learning
CPE Credit Eligibility:
Attendees may be eligible to self-report Continuing Professional Education (CPE) credits based on their participation in qualifying sessions.
To receive CPE credit for a specific track:
CPE credits are calculated based on a 50-minute hour in accordance with NASBA/AICPA standards. It is the attendee’s responsibility to track their participation and ensure compliance with their professional organization’s reporting requirements.
Please note: Certificates will not be issued. Attendees may use session details and agendas to self-report.
For more information on CPE eligibility and self-reporting, visit: https://protect25.proofpoint.com/faqs
Time: 1:45 PM - 2:30 PM
Speaker(s):
Dr. Poppy Crum, Expert in AI, Technology-Driven Innovation & Human Evolution Futurist, Neuroscientist, and Technologist
Ryan Kalember, Chief Strategy Officer, Proofpoint
In a time when emerging technologies are transforming industries and the human experience at an unprecedented pace, Dr. Poppy Crum invites us to look beyond the technical capabilities of AI and the data. A leading voice in the tech-driven innovation, Dr. Crum explores how organizations can harness tools like generative AI not just to drive business outcomes, but to address real human challenges.
This session will challenge attendees to think critically about the intent behind their technology strategies, the ethical implications of innovation, and how to create meaningful human connections -- even with content not created by humans. Dr. Crum's insights will spark new conversations and inspire a more holistic approach to integrating emerging technologies into business and society.
Threat actors are still using email as the number one threat vector, but now they’re making it personal. If BEC, ransomware, and phishing attacks have you down, then this track is for you. Discover how Agentic AI can power up your SOC to stop advanced email threats. Whether you are augmenting your productivity suite, have a need for speed with API deployments, or want rich comprehensive protections through a Secure Email Gateway, this track will explore the flexibility that Proofpoint offers. Don’t forget to look under the hood of the engine that powers it all, mitigating risks with AI and threat intelligence.
Feel like you are overspending on a bunch of fragmented point products that don’t talk to each other? Worried about attackers taking advantage of the ever-expanding digital workspace? Do you shudder at the thought of brand reputation damage, supply chain attacks, and account takeover? Fear no more. This track will dive into a comprehensive approach to stopping human-centric threats for today and tomorrow’s landscape. Explore a broad array of human-centric security protections that can empower organizations to maximize threat prevention and reduce most risk.
Whether it is unintentional data leaks or malicious data theft, protecting your organization’s crown jewels and sensitive data is a human-centric challenge. Is it misdirected emails and emails to unauthorized accounts keeping you awake at night? Are you daydreaming of safeguarding data from malicious, careless and compromised insiders? How are you stopping GenAI data loss and account takeover?
When people get tired, rushed, and stressed it’s no surprise that they make mistakes operationally and in judgement. Threat actors are keen to take advantage of this. What if you could go beyond compliance-based awareness to drive true behavior change and build a security-minded culture? Empowering the people within your organization to be part of the security solution was once just a dream. Now it is reality.
What was the last phone number you memorized? Decades ago, this skill was second nature, yet today, we outsource it entirely to our devices—a shift that has physically altered our brains. As technology automates more of our cognitive processes, our brains adapt and fundamentally change how we think and process information. Dr. Poppy Crum’s groundbreaking research sits at this critical intersection, with a particular emphasis on the next frontier to reshape our neural pathways: AI. Poppy’s work reveals how the AI transformation is not just technological—it’s deeply human, redefining how we live, work, and connect.
In her eye-opening presentations, Poppy unpacks AI’s profound influence on our brains, using compelling industry examples to illustrate how this technology will drive change. As AI becomes a standard tool across sectors, organizations must learn to navigate and adapt to this new reality. Poppy explains how to efficiently leverage human-AI collaboration, identify gaps in skillsets, and ensure employees maintain critical thinking and decision-making abilities. This proactive approach positions industries to harness AI’s transformative potential while preserving the human touch in innovation and problem-solving.
Dr. Poppy Crum is a visionary leader and innovator at the forefront of artificial intelligence, machine learning, and human-computer interaction. As Chief Scientist at Dolby Laboratories for over a decade, she pioneered technologies that leveraged human physiology to enhance digital experiences. Later, as CTO of Trimble, Inc., she developed groundbreaking solutions connecting the physical and digital worlds. Now the founder of Goby Technologies, a consultancy for product and platform innovation with clients like Google and Universal Music Group, Poppy continues to shape the future of technology and its human applications.
She holds numerous patents, chairs global technology standards committees, and has collaborated with organizations such as DARPA and the Consumer Technology Association. A recipient of multiple prestigious awards, including the 2021 Hedy Lamarr Award for Innovation in Entertainment and Technology and the 2018 Lumiere Technology Leadership Award, she has been recognized as one of Billboard magazine’s 100 most influential female executives in the music industry. Her TED Talk on empathetic technology has garnered over one million views, and she is a sought-after speaker at events like SXSW. Through her unparalleled industry expertise, Poppy continues to guide some of the world’s most innovative organizations in aligning cutting-edge technology with human potential.
Chris Inglis is a distinguished cybersecurity leader with over 40 years of federal service. He served as the nation’s first National Cyber Director at the White House (2021–2023) and spent 17 years at the NSA, including as Deputy Director. A retired Brigadier General and command pilot in the U.S. Air Force and Air National Guard, Inglis also held academic and advisory roles, including as a commissioner on the U.S. Cyberspace Solarium Commission and a trustee of the National Intelligence University.
His accolades include the President’s National Security Medal and the Director of National Intelligence Distinguished Service Medal. Inglis holds advanced degrees in engineering and computer science from Columbia, Johns Hopkins, and George Washington University. He resides in Annapolis, Maryland, with his wife, Anna.
Judy Molenaar is the VP and Chief Information Security Officer at Surescripts. She sets the vision, develops plans and oversees the execution of Surescripts' Enterprise Information and Physical Security, Business Continuity and Enterprise Risk Management Programs to ensure comprehensive, high-quality, and effective risk and information security management in support of business goals. With 20 years in cybersecurity, she has held leadership roles overseeing global teams for governance, cybersecurity, HIPAA compliance and identity management in multiple critical industry verticals (manufacturing, retail, and healthcare industries).
Judy is currently the President of the Women in Cyber Security (WiCyS) MN affiliate, an DirectTrust Board Member & Commissioner. She earned her bachelor’s degree in organizational studies from Bethel University and holds a Masters in Security Technologies from the University of Minnesota School of Science.
As CEO of Proofpoint, Sumit Dhawan leads a global workforce of over 4,500 employees focused on defending organizations from advanced cyber threats and compliance risks by protecting their people—and in turn, safeguarding their data, business, and reputation. A seasoned executive with a proven track record, Mr. Dhawan brings over 25 years of experience in building category-leading, scaled enterprise software companies and businesses. Sumit previously served as VMware’s President, where he was responsible for driving over $13B of revenue for the company and led go-to-market functions including worldwide sales, customer success and experience, strategic ecosystem, industry solutions, marketing, and communications. He also previously served as Chief Customer Experience Officer, managing global teams responsible for professional services, technical support, and customer success. Before that, Mr. Dhawan was chief executive officer of Instart, a cybersecurity business delivering innovations in web application performance and security services and held senior executive and general management roles at Citrix.
Mr. Dhawan is a strong advocate for delivering an exceptional experience to customers and partners. He is passionate about building diverse teams and fostering inclusive cultures and equitable environments that bring out the best in everyone. Mr. Dhawan holds an MBA from the Warrington College of Business at the University of Florida, an MS in Computer Science from the University of Minnesota, and a BS in Computer Science from the Indian Institute of Technology (IIT).
Blake P. Sallé is the Chief Revenue Officer at Proofpoint, where he leads the company’s global customer-facing and go-to-market functions. With nearly 30 years of experience, Mr. Sallé has a strong background in building strategic sales, customer success, routes to market, and field operations initiatives that drive momentum, growth, and revenue across international markets.
Before joining Proofpoint in 2017, he served as President of Kony, the leading provider of enterprise mobility solutions. Mr. Sallé has also held senior leadership positions at some of the most recognized and innovative organizations in technology and healthcare such as Cisco, VCE, VMware, EMC, Johnson & Johnson, DXC, PTC, and an Andreessen Horowitz-backed start-up acquired by RSA. Mr. Sallé holds a bachelor’s degree from the University of Texas at Austin.
Patrick Joyce is the Global Resident Chief Information Officer at Proofpoint. In this role, he serves as a strategic advisor to the greater CISO community and spearheads Proofpoint's Customer Advisory Board (CAB). He is focused solely on the security needs of customer CISOs by delivering unbiased advice, knowledge and training to help CISOs stay ahead of the curve in the ever-changing threat landscape.
Mr. Joyce is a highly respected cybersecurity practitioner and industry thought leader with over 30 years of experience in the IT and security field. Before joining Proofpoint in November 2023, he served as Vice President and Chief Security Officer (both CSO & CISO) for Medtronic, a Fortune 500 MedTech enterprise, where he was responsible for leading the company's global security strategies, operations and initiatives.
Prior to joining Medtronic, Patrick held leadership roles in both public and private sector organizations across multiple verticals, including healthcare (both provider & payor), travel/hospitality, and IT consulting. He also served as an Officer in the US Air Force and in the US Intelligence Community.
In addition to his accomplishments as a business partner and trusted advisor, Patrick is also known for his commonsense approach, calm and careful leadership, sound judgement, and ability to communicate effectively at all levels.