̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

proofpoint_logo.png
Proofpoint Virtual Event

Event Date: December 14, 2023
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
This webinar covered: A zero trust framework that can bolster your organizations security
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: February 27, 2024
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
Attendees of this webinar learned: A better understanding of the email threat landscape Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face
proofpoint_logo.png
Multi-Vendor Virtual Event

Event Date: June 20, 2024
Hosted By: Proofpoint, BluVector & ̽»¨ÊÓÆµ
Experts from Proofpoint and BluVector dove into the evolving threat landscape from each company's unique perspective, with a special emphasis on email and network threats. The focus was on the most prevalent threats targeting federal customers, including: Deep Fakes and ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: June 06, 2024
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: August 13, 2024
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
In this comprehensive webinar, cybersecurity experts dove into election scams and related threats, focusing in particular on fake updates like SocGholish that frequently appear on compromised websites with strong political leanings (and as a result, use election content to ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: September 03, 2024
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
In today’s landscape of increasingly sophisticated cyber threats, safeguarding state, local and national security is more crucial than ever. Proofpoint and ̽»¨ÊÓÆµ are thrilled you attended our webinar. We explored how the Cybersecurity Maturity Model Certification (CMMC) can enhance your ...
Kiteworks-microsite.png
Multi-Vendor Virtual Event

Event Date: October 03, 2024
Hosted By: Kiteworks, Proofpoint & ̽»¨ÊÓÆµ
In this webinar, attendees explored: How to leverage Kiteworks & Proofpoint to consolidate and control third-party communications across email, file sharing, MFT, SFTP, web forms, chat, collaboration spaces, or via APIs. Strategies for achieving content-defined zero trust to comply ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: March 25, 2025
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
Proofpoint and ̽»¨ÊÓÆµ hosted a webinar where attendees learned about Proofpoint's advanced email security and archiving solution. These tools streamline email management, making it easier than ever to locate specific messages and maintain compliance with industry regulations. This powerful tool can not only help ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: June 24, 2025
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
Today’s biggest cyber threats don’t target systems—they target people. From phishing and account takeovers to misdirected emails and data loss, attackers increasingly exploit human behavior to breach defenses.  In this webinar, our experts explored how our advanced solutions ...
proofpoint_logo.png
Multi-Vendor Virtual Event

Event Date: August 28, 2025
Hosted By: Proofpoint, Microsoft & ̽»¨ÊÓÆµ
The Cybersecurity Maturity Model Certification (CMMC) is a Department of Defense (DoD) mandate designed to protect sensitive data across its supply chain. More than a regulatory requirement, CMMC demonstrates an ...

Resources


Inside the AI Arms Race: How Cybercriminals Exploit Trusted Tools and Malicious GPTs
Whitepaper

Inside the AI Arms Race: How Cybercriminals Exploit Trusted Tools and Malicious GPTs

This white paper, Inside the AI Arms Race, reveals how cybercriminals leverage both mainstream tools like ChatGPT and specialized malicious GPTs to launch more scalable and sophisticated attacks. It demonstrates how simple prompts can bypass safety features, highlighting the urgent need for AI-driven defenses to counter these evolving threats.


Fill out the form below to view this Resource.