Loading Events

Cybersecurity eSummit: 2021 Threat Review

Home » Events » Cybersecurity eSummit: 2021 Threat Review



Date and Time

December 8 @ 9:45 am - 11:45 pm PST

Event Category

Web Conference


Sponsorship Contact


Send an email to



Cybersecurity eSummit: 2021 Threat Review

Cyber attacks continue to be top of mind for companies in 2021. Almost every organization has been forced to rethink and implement new cybersecurity approaches to ensure business continuity. What have the most successful companies done, what were the lessons learned, and how can we take these use cases to prepare for 2022?

Join Proofpoint and ISSA as we bring you a free cybersecurity eSummit to recap 2021 and provide a sneak peek into 2022. Hear firsthand from cybersecurity practitioners and thought leaders as they deep dive into case studies and discuss best practices against cyber threats.

Click here for registration


Below is the eSummit agenda followed by the topics and descriptions for each session.

9:00 – 9:45 am PT
Keynote – 2021 Lessons Learned & 2022 Sneak Peek


10:00 – 10:45 am PT
Session 2 – Information Protection is More Important Now Than Ever


11:00 – 11:45 am PT
Customer Panel Discussion – Run an Impactful Security Awareness Program

Click here to register


Keynote – 2021 Lessons Learned & 2022 Sneak Peek

In cybersecurity, people are an organization’s last and most important line of defense. 2021 brought unexpected challenges to organizations such as ransomware, email fraud, and cloud account takeover. Organizations need to better prepare against these threats as we move into the new year. So how can you better protect your com

Join experts Ryan Kalember, EVP of Cybersecurity Strategy and Sherrod Degrippo, VP of Threat Research & Detection, as they recap lessons learned from 2021 and prepare for 2022. Learn how you can better protect your most valuable assets: people and data. This session will cover: :

    • The most significant cyber trends and lessons learned in 2021
    • Dissecting most common tactics of threat actors
    • How a people-centric approach can protect your organization


Session 2 – From Security Liability to Asset: Develop Proactive and Resilient Users

Data breaches and leaks can be extremely costly, hurting both your company’s bottom line as well as reputation. Unfortunately, we continue to see more and more attacks. Modern enterprises must address these data security challenges with solutions that guard against employee negligence, stop data breaches and help you remain compliant with data privacy laws.

Join Proofpoint experts as they discuss why legacy, on-premises DLP technology falls short of addressing modern data security risks and requirements. In this 45-minute session, we’ll cover:

    • Data security challenges of today and what to expect tomorrow
    • How people-centric information protection can give you a protective edge
    • The imperative to modernize DLP today


Panel Discussion – Run an Impactful Security Awareness Program

Human error and social engineering continue to be the primary reasons behind data breaches and financial losses to cyber crimes Gartner suggests that security awareness be more than phishing simulation and computer-based training. So how do you run a security awareness program that goes beyond check-box training and phishing simulation? What are the key elements to conducting a program that drives actual security outcomes?.

Join this 45-minute session and hear from our customer panelists and subject matter experts from Costco and Eli Lilly. You’ll learn about:

    • The challenges of running an impactful security awareness program
    • How to keep users engaged and drive user behavior change
    • How to measure and communicate program success
    • Featured Customer Case Studies from: Costco & Eli Lilly



Sherrod DeGrippo – Sr. Director, Threat Research and Detection, Proofpoint

Sherrod DeGrippo is the Sr. Director of Threat Research and Detection for Proofpoint, Inc. She leads a worldwide malware research team to advance Proofpoint threat intelligence and keep organizations safe from cyberattacks. With more than 15 years of information security experience, Sherrod successfully directs her 24/7 team to investigate advanced threats, release multiple daily security updates and create scalable threat intelligence solutions that integrate directly into Proofpoint products.

My interests and strengths lie in information security and start up environments. I have a strong information security technical consulting background as well as pre- and post- sales experience for large enterprise MSSP providers. My entrepreneurial experience has been in a successful business for over 8 years. Further, I was selected for and completed the Kauffman Foundation's FastTrac program for startup entrepreneurs.

I've been a travel/remote employee and consultant for several years. Fortunately, I've condensed working from home and travelling down to a finely balanced science.

I've previously held a Top Secret or “Q” clearance and would be comfortable holding a federal government clearance again.

My professional certifications and related training include:

*National Security Agency's INFOSEC Assessment Methodology (IAM Certification)
*SANS Track 508: System Forensics, Investigation and Response
*SANS Track 504: Hacker Techniques, Exploits and Incident Handling
*DOE Counter-Intelligence Threats to Information Technology
*Intermediate Penetration Testing with New Horizon
*Snort SourceFire training
*HP Webinspect web application assessment training
*FCC Licensed Amateur Radio operator since 1993 (Callsign KD4RBD)
*FAR Federal Acquisition Requirements for federal contractors
*General Assembly, Atlanta – Social Media 101
*General Assembly, Atlanta – Intro to Content Strategy
*General Assembly, Atlanta – Into to SEO
*General Assembly, Atlanta – Brand in a Day
*General Assembly, Atlanta – Google Analytics 101

Western Michigan University, Kauffman Foundation
Graduate of FastTrac Entrepreneurial Program

See Sherrod DeGrippo‘s full profile.

Ryan Kalember – Executive Vice President, Cybersecurity Strategy, Proofpoint

With almost 20 years of experience in the information security industry, Mr. Kalember currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for leadership and commentary on breaches and best practices. His global team of security experts ensures that Proofpoint’s customers have consistent insight into the attacks that target their people. Ryan has become a sought-out expert for guidance on cybersecurity and best practices. Throughout his career, Ryan has provided cybersecurity counsel to global government delegations including Jordan, North Macedonia, Peru, and Spain. He also works with the National Governors Association and is a board member of the National Cyber Security Alliance and the Cybersecurity Technical Advisory Board. As a result, he is a go-to source for breaking security news, regularly providing insight to ABCNews.com, Bloomberg, Bloomberg Radio, CNBC, Forbes, Fortune, NBC Nightly News, USA Today, and WIRED. He is also a contributor to the Forbes Technology Council.

Mr. Kalember joined Proofpoint from WatchDox where he served as both chief product officer and CMO, leading the development of pioneering data-centric security solutions through to the company’s acquisition. Previously, Ryan ran solutions across HP’s portfolio of security products, was director of product strategy at ArcSight, and held a variety of positions at VeriSign, including EMEA regional manager and senior product manager. Early in his career, Ryan was a security practitioner, helping build many leading security organizations and security operations centers (SOCs) around the world. He received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

See Ryan Kalember‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top