̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

proofpoint_logo.png
Proofpoint

Rethink Your Approach to Cybersecurity


Event Date: September 24, 2020
Hosted By: Proofpoint

Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it's crucial to understand the data your users have access to and how they are handling that sensitive information.

With over 90% of attacks originating from email and countless breaches caused by human error, it's important to engage your end-users and create a culture of security awareness. Now is the time to gain visibility and understanding of your greatest security risk: your people. 

We discussed why your agency should consider a fundamental shift in your approach to a cybersecurity strategy. During this webinar, attendees heard: 

  • About the changes to the cybersecurity threat landscape and the tools that cybercriminals are using to attack your agency
  • How to gain visibility into all types of threats that affect your people and prioritize alerts and incidents according to relative risk to your organization
  • From Bruce Brody, Federal CISO at Proofpoint, about the importance of a People-Centric approach to security and the benefits of adopting this strategy 
  • Why Abdul Manraj, Email Manager at Booz Allen Hamilton, decided to adopt a People-Centric security strategy for his organization 

Fill out the form below to view this archived event.


Resources


Accelerate Digital Transformation, Enable Compliance, and Mitigate Risk with Sovereign Cloud Capabilities from SAP
Datasheet

Accelerate Digital Transformation, Enable Compliance, and Mitigate Risk with Sovereign Cloud Capabilities from SAP

Cloud computing is the foundation for technological advancements that are driving the shift towards digital transformation. Both governments and high-risk organizations, like those responsible for critical infrastructure, are eager to adopt cloud technology. However, as this trend gains momentum, there is a growing focus on ensuring cloud security and compliance, with information technology regulations at an all-time peak. SAP offers businesses the opportunity to utilize sovereign cloud capabilities, which not only meet compliance requirements for cloud sovereignty, but also provide complete control and security over their cloud workloads, even in unpredictable geopolitical situations.


Fill out the form below to view this Resource.