Archived Events
This webinar covered:
A zero trust framework that can bolster your organizations security
Attendees of this webinar learned:
A better understanding of the email threat landscape
Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face
Experts from Proofpoint and BluVector dove into the evolving threat landscape from each company's unique perspective, with a special emphasis on email and network threats. The focus was on the most prevalent threats targeting federal customers, including:
Deep Fakes and ...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering ...
In this comprehensive webinar, cybersecurity experts dove into election scams and related threats, focusing in particular on fake updates like SocGholish that frequently appear on compromised websites with strong political leanings (and as a result, use election content to ...
In today’s landscape of increasingly sophisticated cyber threats, safeguarding state, local and national security is more crucial than ever. Proofpoint and Carahsoft are thrilled you attended our webinar. We explored how the Cybersecurity Maturity Model Certification (CMMC) can enhance your ...
In this webinar, attendees explored:
How to leverage Kiteworks & Proofpoint to consolidate and control third-party communications across email, file sharing, MFT, SFTP, web forms, chat, collaboration spaces, or via APIs.
Strategies for achieving content-defined zero trust to comply ...
Proofpoint and Carahsoft hosted a webinar where attendees learned about Proofpoint's advanced email security and archiving solution. These tools streamline email management, making it easier than ever to locate specific messages and maintain compliance with industry regulations. This powerful tool can not only help ...
Today’s biggest cyber threats don’t target systems—they target people. From phishing and account takeovers to misdirected emails and data loss, attackers increasingly exploit human behavior to breach defenses.
In this webinar, our experts explored how our advanced solutions ...
The Cybersecurity Maturity Model Certification (CMMC) is a Department of Defense (DoD) mandate designed to protect sensitive data across its supply chain. More than a regulatory requirement, CMMC demonstrates an ...