Back to Search Begin New Search Save Search Auto-Notify
Uncover Hidden Threats in Your O365 Env...
All email, cloud, and compliance solutions are not created equal. As organizations move to Microsoft 365, many assume that the platform's built-in or bundled features will keep users safe and compliant. But these "good enough" features may not be good enough for your organization. New tools introduce new complexities, and new threats use social engineering to target people instead of infrastructure. Proofpoint's unique people-centric solutions...
November 18, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
A Holistic People-Centric Approach to I...
Your agency is facing a world today that is more global, transient, and connected than ever before. Traditional cybersecurity solutions are focused on outside-in. Modern security programs need to complement traditional security solutions with a solution that looks inside-out. Proofpoint's ObserveIT Insider Threat Management (ITM) correlates activity and data movement, empowering security teams to identify user risk, detect insider-led data bre...
November 10, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Mitigate Risk and Improve Security with...
With 94% of breaches starting with an email attack, it's more important than ever to protect your users from targeted phishing and malware attacks.Join us on November 5th, to learn how SailPoint and Proofpoint can detect and protect you against modern threats like ransomware, phishing, Business Email Compromise, and Employee Compromise while identifying and protecting your agency's vulnerable identities and their access to your most sensitive...
November 5, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Rethink Your Approach to Cybersecurity
Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it's crucial to understand the data your users have access to and ho...
September 24, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Mitigating Business Email Compromise an...
Email fraud leads to two main threats - one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers become you. BEC/EAC scams have cost the victimized organizations over $26 billion since 2016. What they have in common is that they both target people.They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware...
September 22, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
People-Centric Security for Cloud Services
Working safely and securely from remote locations has never been more important. However, legacy methods of remote access can open potential security risks. With most remote work happening over cloud-based email and other SaaS apps such as Office 365, G Suite, and Box, this leaves your remote workforce vulnerable as these apps contain sensitive data, which must be protected. The path to better cloud application security lies in an integrated a...
August 11, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
People-Centric Security for Cloud Services
Working safely and securely from remote locations has never been more important. However, legacy methods of remote access can open potential security risks. With most remote work happening over cloud-based email and other SaaS apps such as Office 365, G Suite, and Box, this leaves your remote workforce vulnerable as these apps contain sensitive data, which must be protected. The path to better cloud application security lies in an integrated a...
July 14, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
May 19, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Enterprise Archiving For Federal Agencies
With email being the largest repository to manage, it's critical that Federal agencies supervise and retain this content according to regulations. Proofpoint Enterprise Archive is a FedRAMP authorized, cloud-based email archiving solution. It provides a centralized, third party, searchable repository to help federal agencies simplify legal discovery, respond to FOIA requests, and implement email records management according to NARA Capstone g...
May 5, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Prevent & Detect Ransomware Attacks Lun...
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. Security leaders at government agencies have a complex workforce to protect. Today, agency employees, contractors, partners, and even citizens all need access to applications and resources from a variety of different locations, including at work, at home, or from a local coffee shop. The rise of cloud and mobile devices has cataly...
March 26, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Virtual
Add Favorite
Back to Search Begin New Search