Join us for a forward-looking itinerary packed with the learnings and networking you'll need to stay ahead.
With trillions of email and cloud-based attacks occurring annually, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.
Add to calendar*subject to changes
Powerful tracks designed to help you maximize your cybersecurity investment
Explore the latest changes in the email threat landscape and how Proofpoint customers stay ahead of attackers. Grab your front-row seat to evolving best practices, and get a preview into our email protection innovation roadmap featuring agentic AI to power up your SOC.
Discover how attackers execute sophisticated, multichannel, multistage attacks that extend beyond email. Secure your spot to explore effective security measures, new feature enhancements, and peer-driven best practices for stopping human-centric threats with a comprehensive defense.
From front-line defenders to strategic visionaries: Secure your future when learning about what's next.
Need help justifying your trip?
Download our business justification letter as a template for your business case.
Time: 2:00 PM - 4:00 PM
Open to all, this hands-on workshop is designed for those who want to sharpen their executive communication skills and drive impact at the highest levels of an organization.
Whether you're briefing the board, presenting to the audit committee, or making the case for budget and resources, how you deliver your message is just as important as what you say. In this interactive session, you’ll hear from security and business leaders who’ve navigated real-world high-stakes conversations— and learn how to craft messages that resonate with decision-makers.
Join peers from across the industry to explore what works (and what doesn’t) when presenting security topics to non-technical executives. You’ll walk away with practical strategies to influence without oversimplifying, manage tough questions with confidence, and elevate your presence in the room where it happens.
This session is open to all participants who are ready to lead from the front— regardless of role, title, or gender identity.
Time: 4:00 PM - 6:00 PM
Kick off your Proofpoint Protect 2025 experience at our Welcome Reception—an evening designed to spark connection, conversation, and community. Hosted by Proofpoint, this relaxed networking event brings together cybersecurity professionals, industry leaders, and fellow attendees for drinks, light bites, and great company. Whether you’re reconnecting with familiar faces or meeting peers for the first time, this is your chance to start the week on a high note. We can’t wait to welcome you!
Time: 7:00 AM - 9:00 AM
New to Proofpoint Protect? Join us during our First-Timer Breakfast on September 23—an exclusive event designed to welcome newcomers and kickstart your conference experience with confidence. This relaxed, informal gathering offers the perfect opportunity to connect with fellow first-time attendees, meet members of the Proofpoint team, and get insider tips on how to make the most of your time at Proofpoint Protect. You’ll gain a clear understanding of the agenda, learn how to navigate the event, and begin building meaningful connections before the conference is in full swing. Start your Proofpoint Protect journey with a warm welcome and a head start. We can’t wait to meet you!
Time: 9:00 AM - 10:05 AM
The Next Chapter: Human-Centric, AI-Driven Security
Featuring Sumit Dhawan, CEO
Join CEO Sumit Dhawan as he shares a bold vision for securing both the human and the digital human in an AI-driven world. Learn how a single, integrated platform can reduce risk, drive outcomes, and empower defenders at every level — with major announcements that redefine what’s possible. This is where the next chapter of Human-Centric, AI-Driven security begins.
Time: 1:00 PM - 1:30 PM
Too many security teams are stuck in reactive mode when responding to email threats. Some Proofpoint customers are charting a different course. In this session, you’ll hear from security leaders who transformed their SOC by connecting Proofpoint with their broader SecOps ecosystem — including SIEM, SOAR, SASE, XDR, and identity tools — to enable faster triage, deeper correlation, and automated response. You’ll walk away with practical recommendations for building a more efficient email SOC.
Time: 1:35 PM - 2:05 PM
Agentic AI is reshaping how products think, act, and deliver value. In this breakout session, we’ll dive into our product roadmap and how we’re integrating agentic AI to drive smarter automation, proactive decision-making, and more intuitive user experiences. Get a first look at what’s coming next—and how it will unlock powerful new capabilities for you.
Time: 2:35 PM - 2:45 PM / 2:45 PM - 2:55 PM / 2:55 PM - 3:05 PM
Facing questions about why you need more than Microsoft 365? In this breakout session, we’ll explore how security leaders can build a strong business case for how Proofpoint complements your M365 investment. Hear from your peers on how they developed business cases that highlighted risk reduction, business value, and demonstrated why "just Microsoft" isn't enough.
Time: 3:10 PM - 3:20 PM / 3:20 PM - 3:30 PM / 3:30 PM - 3:45 PM
Threat Protection Workbench is a game-changer for SOC analysts. In this session, we will explore key use cases and success stories from a SOC analyst’s perspective to help them understand how to incorporate this exciting new tool into day-to-day investigations. With the integration of new Abuse Mailbox capabilities, we will also look at the pitfalls of traditional management of user-reported mail and how a SOC analyst’s day-to-day work will be revolutionized with this highly anticipated new feature.
Time: 1:00 PM - 1:30 PM
More tools often mean more complexity—and more risk. As threats grow and environments expand, point solutions can’t keep up. In this session, we’ll explore the challenges of managing fragmented point solutions and discuss how an integrated platform approach streamlines operations, strengthens defenses and delivers better security outcomes with lower TCO.
Time: 1:35 PM - 2:05 PM
As the digital workspace expands, account compromise is becoming increasingly inevitable. Attackers are also shifting tactics—targeting your suppliers and business partners to reach your employees. Learn about the strategies and essential capabilities needed to effectively defend against these evolving threats.
Time: 2:35 PM - 2:45 PM / 2:45 PM - 2:55 PM / 2:55 PM - 3:05 PM
Most organizations focus on defense when it comes to impersonation threats—why not shift to offense? In this breakout session, we’ll explore proactive approaches to identify, disrupt, and deter impersonation attacks. Learn how to leverage threat intelligence, domain monitoring, DMARC enforcement, and takedown strategies to get ahead of bad actors.
Time: 3:10 PM - 3:20 PM / 3:20 PM - 3:30 PM / 3:30 PM - 3:45 PM
Account takeover (ATO) is a growing threat with far-reaching consequences—from data theft to broader, multi-stage attacks. In this session, we’ll explore the full ATO lifecycle—from initial compromise to downstream impact. Topics include real-world attack flows, evolving threat intelligence, and key enablers such as phishing and business email compromise. You’ll walk away with practical insights to better detect, prevent, and respond to these pervasive threats.
Time: 1:00 PM - 1:30 PM
As defenders of your organization’s data, you know how disconnected tools and manual processes can make it challenging to secure your sensitive information. Join this session for practical guidance from Proofpoint experts and practitioners on how to build a unified, AI-driven data security program to protect against data exfiltration, exposure, and insider threats.
Time: 1:35 PM - 2:05 PM
Most organizations address insider risk only after the damage has been done. Learn how early identification and behavioral monitoring can shift your strategy from reactive to proactive. This session examines real-world scenarios involving careless users and malicious insiders, highlighting how a comprehensive approach can mitigate risk before incidents occur.
Time: 2:35 PM - 2:45 PM / 2:45 PM - 2:55 PM / 2:55 PM - 3:05 PM
Experience three fast-paced lightning talks highlighting both the latest Proofpoint data security innovations and powerful existing capabilities you may have missed. Explore new platform enhancements and revisit key features—old and new—that help you reduce risk and accelerate productivity across your organization. Don’t miss these essential updates designed to maximize the value of your investment in Proofpoint data security solutions!
Time: 3:10 PM - 3:20 PM / 3:20 PM - 3:30 PM / 3:30 PM - 3:45 PM
As Proofpoint introduces enterprise AI chat and AI agents, our data risk and security strategy centers on three key areas. We are prioritizing proper security settings for both AI platforms like Copilot and the systems they access. We’re also ensuring granular access controls are enforced for each piece of data, so only authorized users can view sensitive information. Additionally, as users create custom agents and workflows, we are guiding them to build securely and avoid accidental data exposure. Join us to learn how Proofpoint’s SIPM and DSPM solutions support our secure enterprise AI deployment.
Time: 1:00 PM - 1:30 PM
This session explores how to effectively measure security behavior change at both the operational and strategic levels. You'll learn how to go beyond basic metrics like click rates and course completions to identify indicators that reflect true behavior change and risk reduction.
Time: 1:35 PM - 2:05 PM
As AI empowers attackers to craft more convincing phishing lures at scale, traditional training methods are no longer enough. In today’s dynamic threat landscape, security teams need smarter, more adaptive ways to prepare users for evolving attack tactics. Join our experts to discover how threat intelligence can elevate your program—enhancing learner engagement, changing user behavior, and driving measurable improvements in organizational resilience.
Time: 2:35 PM - 2:45 PM / 2:45 PM - 2:55 PM / 2:55 PM - 3:05 PM
The definition of "culture" is unique to every organization, and the definition is not static. Cultural influences come from multiple angles—including you. This session explores how to drive a stronger security culture by aligning your mission with a human risk management strategy and leveraging advocacy and everyday engagement to evolve your program. Our panelists will discuss how they've identified and overcome obstacles and share proven tactics you can apply in your organization.
Time: 3:10 PM - 3:20 PM / 3:20 PM - 3:30 PM / 3:30 PM - 3:45 PM
Learn how organizations are evolving beyond compliance to drive real behavior change - leveraging microlearning, gamification, and the Learner Dashboard to engage and motivate users. Hear how they overcome the challenges of creating and maintaining a culture of security. You’ll leave this session with practical examples you can apply to your own program, no matter where you are in your journey.
Time: 5:30 PM - 6:00 PM
Shuttle transportation will be provided to the evening event, giving you time to drop off your bags and freshen up after a full day at the conference. Hop on board and relax as we take care of getting you there comfortably and on time.
Time: 6:00 PM - 9:00 PM
Get ready to turn up the volume in Music City! Join us for an unforgettable night at our Nashville Nights at Proofpoint Protect 2025 — located in the heart of the iconic Broadway strip. This exclusive evening event is the perfect chance to unwind, connect, and celebrate alongside fellow customers, partners, and industry peers. With live music, Southern-inspired bites, and sweeping rooftop views, you’ll experience the true spirit of Nashville — where great conversations meet even greater country vibes. Don’t miss this high-energy highlight of the conference that blends networking with a taste of local flavor.
Time: 9:00 AM - 10:30 AM
With trillions of email and cloud-based attacks occurring annually, Proofpoint is often among the first to detect emerging trends, techniques, and threat actors targeting people.
Join us for a special edition of the Proofpoint Power Series, broadcast live from Protect 2025 in Nashville. This session will feature insights from leaders in our Threat Research program as they explore the current state of the threat landscape and what it takes to stay ahead of adversaries. From espionage and cybercrime to the growing role of AI, one truth remains constant: people are at the center of today’s cybersecurity challenges.
Topics will include:
With industry-leading visibility into malicious activity, Proofpoint protects customers from billions of email, cloud, SMS, and insider threats every year. Don’t miss this opportunity to hear from the experts shaping the future of cybersecurity.
Time: 10:45 AM - 11:15 AM
Misconfigurations in email security setups can quietly create gaps that attackers exploit—especially in Microsoft 365 and hybrid environments. We’ll walk through the most common missteps organizations make, like missing a key setting in M365 that allows direct delivery, incorrect relay permissions, or firewall rules that let unwanted traffic through. We’ll share real-world examples to show how to identify issues that can lead to big risks—and how to fix them quickly. You'll come away with practical tips to boost protection without added complexity.
Time: 11:20 AM - 11:50 AM
Get an inside look at the AI-powered defenses built into Proofpoint products. Learn how our models detect threats in real time—and how these innovations protect your users across every email. Get an early look at upcoming Nexus detection innovations.
Time: 12:35 PM - 12:45PM / 12:45PM - 12:55 PM / 12:55 PM - 1:05 PM
We’re in an era of unprecedented innovation—unfortunately, that includes bad actors. In this session, our experts will unpack key trends in today’s threat landscape and walk through real-world examples that reveal how threat actors are adapting. Topics will include emerging social engineering tactics, the growing misuse of remote monitoring and management (RMM) tools, and the surge in inject-based compromises of legitimate websites.
Time: 1:10 PM - 1:20 PM / 1:20 PM - 1:30 PM / 1:30 PM - 1:40 PM
Email fraud is evolving fast—and it’s getting harder to spot. In this session, we’ll break down the next wave of emerging attacks, blending front-line threat research with real-world customer cases. From the use of AI to identity spoofing, today’s attackers are using new tools to exploit trust in ways we’ve never seen before. You’ll leave with a clear picture of where threats are headed, and how to future-proof your defenses for 2026 and beyond.
Time: 10:45 AM - 11:15 AM
While email remains the primary threat vector, attackers are increasingly exploiting digital channels like Teams, Slack, and Zoom to target users. Join this session as our experts and customers discuss the sophisticated tactics observed across these platforms—and share effective security controls to help you stay ahead of the evolving attack surface.
Time: 11:20 AM - 11:50 AM
Organizations today rely heavily on email—whether sent by users or applications, hosted in the cloud or on-premises. As they navigate challenges like cloud migration, end-of-life for legacy Exchange environments, evolving security threats, and DMARC compliance, ensuring reliable email deliverability has become increasingly complex. Join this session as our experts break down the key elements for improving deliverability across both user- and application-generated email while ensuring clean, trusted email traffic.
Time: 12:35 PM - 2:45 PM / 2:45 PM - 12:55 PM / 12:55 PM - 1:05 PM
Learn about upcoming changes in the email authentication landscape, including the next proposed changes in IETF standards land, namely DKIM2 and DMARCbis. Hear what large mailbox providers are planning and why DKIM is the preferred long term authentication method.
Time: 10:45 AM - 11:15 AM
Now is the time to shift to modern, human-centric DLP. Learn how Proofpoint’s adaptive, AI-driven solutions unify content and behavior insights—identifying sensitive data, monitoring risky actions, and dynamically adjusting controls. Gain practical guidance on how to evaluate alternatives, transition from legacy DLP solutions, expand your program without increasing headcount, and communicate the value of your program to management and the board.
Time: 11:20 AM - 11:50 AM
GenAI tools, such as ChatGPT and Microsoft Copilot, are accelerating productivity and innovation, but not without risk. As employees use these tools to streamline tasks and build applications, sensitive data can be unintentionally exposed or misused. This session shares actionable strategies for governing Copilot and managing Shadow AI risks, enabling everyone, from knowledge workers to developers, to use AI safely.
Time: 12:35 PM - 12:45 PM / 12:45 PM - 12:55 PM / 12:55 PM - 1:05 PM
Bring your toughest cloud data security challenges to our DSPM experts. Learn how to govern access to Snowflake, discover and manage abandoned data across AWS, Azure, and GCP, and uncover, prioritize, and remediate sensitive cloud data exposures for stronger, more efficient protection of your organization’s most valuable information.
Time: 1:10 PM - 1:20 PM / 1:20 PM - 1:30 PM / 1:30 PM - 1:40 PM
Email remains the number one channel for data loss, especially as generative AI, hybrid work, and SaaS collaboration amplify the risks. First, this session examines how evolving user behavior and emerging threat vectors are transforming the landscape of email data loss. Second, it examines the advantages of a hybrid approach to email DLP that combines rules-based and behavioral AI-based solutions. Third, the session offers practical guidance for unifying email DLP data protection, emphasizing its essential role in risk reduction amid today’s evolving threats.
Time: 10:45 AM - 11:15 AM
Get visibility into Proofpoint Human-centric security roadmap highlighting the use of AI, automated workflows, and integrations between Human Risk Explorer and ZenGuide. Innovations that identify at-risk employees and deliver contextual learning experiences that result in strengthened resilience against today’s human-centric threat landscape. This session will demonstrate these capabilities in the context of a security admin and end-user experience that combines detection of human risk trends, adaptive risk-based delivery of content, contextual education based on user choice, and measurement of behavior change and risk reduction.
Time: 11:20 AM - 11:50 AM
What does it mean to be a high-risk user? This session will help you answer that and more. Learn best practices for building meaningful risk profiles using key risk attributes like threat exposure, vulnerability to phishing, data handling behaviors, and user privilege. We’ll discuss how to interpret and act on these insights by aligning profiles with targeted training, user notifications, simulations, and assessments so you can drive real behavior change where it matters most.
Time: 12:35 PM - 12:45 PM / 12:45 PM - 12:55 PM / 12:55 PM - 1:05 PM
Traditional cybersecurity awareness programs often check the box on compliance but fall short in reducing human risk. In this brief session, we’ll introduce Proofpoint’s Human Risk Management Maturity Model—a practical framework for shifting from a reactive training approach to a proactive, risk-based strategy. We’ll also touch on how the model aligns with the Fogg Behavior Model, showing how motivation, ability, and timely prompts can influence secure behavior. Walk away with high-level, actionable steps to begin evolving your program from compliance-focused to behavior-driven.
Time: 1:10 PM - 1:20 PM / 1:20 PM - 1:30 PM / 1:30 PM - 1:40 PM
Managing human risk at scale requires a smarter approach—one that combines intelligence, automation, and contextual learning. In this session, our expert will share our vision for leveraging AI to streamline program management, uncover behavior-based risk insights, and deliver personalized, adaptive learning. Whether you’re just starting out or scaling an existing program, discover how we’re evolving our solution to drive lasting behavior change.
Threat actors are still using email as the number one threat vector, but now they’re making it personal. If BEC, ransomware, and phishing attacks have you down, then this track is for you. Discover how Agentic AI can power up your SOC to stop advanced email threats. Whether you are augmenting your productivity suite, have a need for speed with API deployments, or want rich comprehensive protections through a Secure Email Gateway, this track will explore the flexibility that Proofpoint offers. Don’t forget to look under the hood of the engine that powers it all, mitigating risks with AI and threat intelligence.
Feel like you are overspending on a bunch of fragmented point products that don’t talk to each other? Worried about attackers taking advantage of the ever-expanding digital workspace? Do you shudder at the thought of brand reputation damage, supply chain attacks, and account takeover? Fear no more. This track will dive into a comprehensive approach to stopping human-centric threats for today and tomorrow’s landscape. Explore a broad array of human-centric security protections that can empower organizations to maximize threat prevention and reduce most risk.
Whether it is unintentional data leaks or malicious data theft, protecting your organization’s crown jewels and sensitive data is a human-centric challenge. Is it misdirected emails and emails to unauthorized accounts keeping you awake at night? Are you daydreaming of safeguarding data from malicious, careless and compromised insiders? How are you stopping GenAI data loss and account takeover?
When people get tired, rushed, and stressed it’s no surprise that they make mistakes operationally and in judgement. Threat actors are keen to take advantage of this. What if you could go beyond compliance-based awareness to drive true behavior change and build a security-minded culture? Empowering the people within your organization to be part of the security solution was once just a dream. Now it is reality.