̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

proofpoint_logo.png
Proofpoint Virtual Event

Event Date: December 14, 2023
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
This webinar covered: A zero trust framework that can bolster your organizations security
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: February 27, 2024
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
Attendees of this webinar learned: A better understanding of the email threat landscape Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face
proofpoint_logo.png
Multi-Vendor Virtual Event

Event Date: June 20, 2024
Hosted By: Proofpoint, BluVector & ̽»¨ÊÓÆµ
Experts from Proofpoint and BluVector dove into the evolving threat landscape from each company's unique perspective, with a special emphasis on email and network threats. The focus was on the most prevalent threats targeting federal customers, including: Deep Fakes and ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: June 06, 2024
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: August 13, 2024
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
In this comprehensive webinar, cybersecurity experts dove into election scams and related threats, focusing in particular on fake updates like SocGholish that frequently appear on compromised websites with strong political leanings (and as a result, use election content to ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: September 03, 2024
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
In today’s landscape of increasingly sophisticated cyber threats, safeguarding state, local and national security is more crucial than ever. Proofpoint and ̽»¨ÊÓÆµ are thrilled you attended our webinar. We explored how the Cybersecurity Maturity Model Certification (CMMC) can enhance your ...
Kiteworks-microsite.png
Multi-Vendor Virtual Event

Event Date: October 03, 2024
Hosted By: Kiteworks, Proofpoint & ̽»¨ÊÓÆµ
In this webinar, attendees explored: How to leverage Kiteworks & Proofpoint to consolidate and control third-party communications across email, file sharing, MFT, SFTP, web forms, chat, collaboration spaces, or via APIs. Strategies for achieving content-defined zero trust to comply ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: March 25, 2025
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
Proofpoint and ̽»¨ÊÓÆµ hosted a webinar where attendees learned about Proofpoint's advanced email security and archiving solution. These tools streamline email management, making it easier than ever to locate specific messages and maintain compliance with industry regulations. This powerful tool can not only help ...
proofpoint_logo.png
Proofpoint Virtual Event

Event Date: June 24, 2025
Hosted By: Proofpoint & ̽»¨ÊÓÆµ
Today’s biggest cyber threats don’t target systems—they target people. From phishing and account takeovers to misdirected emails and data loss, attackers increasingly exploit human behavior to breach defenses.  In this webinar, our experts explored how our advanced solutions ...
proofpoint_logo.png
Multi-Vendor Virtual Event

Event Date: August 28, 2025
Hosted By: Proofpoint, Microsoft & ̽»¨ÊÓÆµ
The Cybersecurity Maturity Model Certification (CMMC) is a Department of Defense (DoD) mandate designed to protect sensitive data across its supply chain. More than a regulatory requirement, CMMC demonstrates an ...

Resources


From Data to Real Time Intelligence: Edge Computing for National Security Missions
Solutions Brief

From Data to Real Time Intelligence: Edge Computing for National Security Missions

The Department of Homeland Security (DHS) and the Department of Justice (DOJ) protect national security by securing infrastructure, fighting terrorism and enforcing federal laws. Red Hat solutions help these agencies use edge computing securely, easing the cybersecurity load on overburdened IT teams. Download the resource to learn more!