Archived Events
Proofpoint and Carahsoft hosted a webinar where attendees gained invaluable insights that can be immediately applied to defending against Cyber Criminals targeting libraries and K-12 schools.
The webinar explored:
The E-Rate Cybersecurity Funding ...
In this webinar, attendees explored:
How to leverage Kiteworks & Proofpoint to consolidate and control third-party communications across email, file sharing, MFT, SFTP, web forms, chat, collaboration spaces, or via APIs.
Strategies for achieving content-defined zero trust to comply ...
In today’s landscape of increasingly sophisticated cyber threats, safeguarding state, local and national security is more crucial than ever. Proofpoint and Carahsoft are thrilled you attended our webinar. We explored how the Cybersecurity Maturity Model Certification (CMMC) can enhance your ...
Carahsoft’s Election Security Readiness Week took place during the week of August 12-15, 2024.
Here's what attendees experienced during this campaign:
Election Security Focused Sessions: We will be hosting various sessions from Monday, August 12 to Thursday, ...
In this comprehensive webinar, cybersecurity experts dove into election scams and related threats, focusing in particular on fake updates like SocGholish that frequently appear on compromised websites with strong political leanings (and as a result, use election content to ...
Experts from Proofpoint and BluVector dove into the evolving threat landscape from each company's unique perspective, with a special emphasis on email and network threats. The focus was on the most prevalent threats targeting federal customers, including:
Deep Fakes and ...
A comprehensive approach to stopping sensitive data loss combines a traditional rules-based approach with behavioral AI.
Organizations face substantial security risks from misdirected emails and data exfiltration, leading to increased labor costs for investigations, regulatory reporting, and compliance ...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering ...
Attendees of this webinar learned:
A better understanding of the email threat landscape
Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face
This webinar covered:
A zero trust framework that can bolster your organizations security