Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
Email continues to be the primary vector for initiating malicious activity. Proofpoint is uniquely positioned to reference, with data and evidence, both named activity sets (threat actors) and macro trends observable across the landscape as a whole— allowing agencies to innovate the way they deploy, protect and operate perimeter defenses to meet the emerging threat challenges of today and tomorrow.
In this session, Daniel Blackford, Head of Threat Research at Proofpoint, discussed:
Fill out the form below to view this archived event.
Explore key insights into the federal Public Trust vetting process, including how it differs from security clearances, what roles fall under public trust, and how Trusted Workforce 2.0 is modernizing personnel vetting. Learn about the risk levels, required forms, and continuous vetting updates impacting non-sensitive government positions. Get the guide to stay informed on what it takes to navigate and succeed in Public Trust roles.
Fill out the form below to view this Resource.