Cybersecurity Best Practices:
Big 10 Universities

Zoom | Tuesday, April 20, 2021 | 11:30AM - 12:30PM CT

Most universities depend on multiple external vendors and partners to support their business activities as part of their supply chain. These complex supply chains are attractive targets for cybercriminals.

It’s time to shine more light on the supply chain as an abuse vector. Emails impersonating a trusted business partner are more likely to trick the target into taking an unauthorized action. These business email compromise (BEC) attacks are hard to detect and increasingly malicious.

Join Curtis Wray and Christopher Montgomery, Proofpoint Principal Solution Architects, to review cybersecurity best practices for the Big 10 Universities. We’ll highlight:

  • Analysis and peer comparison of Big 10 University threat data
  • Threat intelligence trends and how they impact universities
  • Third-party and supply chain risks faced by universities
  • Best practices for identifying and mitigating these threats

Agenda

April 20

  • 11:30AM - 11:35AM CT
    Welcome and Introductions
  • 11:35AM - 12:20PM CT
    Cybersecurity Best Practices: Big 10 Universities
  • 12:20PM - 12:30PM CT
    Q&A

FEATURED SPEAKERS

Chris Montgomery
Chris Montgomery | Principal Solution Architect, Proofpoint, Inc.

Chris Montgomery is a Principal Solution Architect at Proofpoint, where he is responsible for the implementation and integration of all threat intelligence and intrusion detection solutions. In this role, he consults with security practitioners and OEM suppliers and focuses on utilizing threat intelligence to improve network security and the overall risk posture of an organization. Mr. Montgomery is a CCIE and holds several other industry certifications, including CISSP and ITIL.

Curtis Wray
Curtis Wray | Principal Solution Architect, Proofpoint, Inc.

Curtis has nearly 20 years of experience in the IT security consulting, services and sales arena. During the first 10 years of his career, he helped Fortune 500 companies develop security best practices; implement best-of-breed security tools; and obtain security and framework certifications to keep their organizations agile and secure. Over the last nine years, he’s helped map Proofpoint to the growing security needs of today’s organizations by participating in industry work groups; connecting security teams to leverage each other’s strengths in an ever-expanding threat landscape; and evangelizing for improving secure across multiple sectors. Curtis helped build Proofpoint’s Public Sector vertical practice and is as one of two security solutions architects at Proofpoint.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or similar ISPs are not accepted.
(ISC)2 CPE Logo

Earn 1 CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.