You're invited

Cybersecurity Best
Practices: K-12

This event has been cancelled. Please visit www.proofpoint.com/events to register for upcoming Proofpoint events.

Zoom | Wednesday, June 16, 2021 | 11:30AM - 12:30PM CT


Most school districts depend on multiple external vendors and partners to support their business activities as part of their supply chain. These complex supply chains are attractive targets for cybercriminals.

It’s time to shine more light on the supply chain as an abuse vector. Emails impersonating a trusted business partner are more likely to trick the target into taking an unauthorized action. These business email compromise (BEC) attacks are hard to detect and increasingly malicious.

Join Christopher Montgomery, Proofpoint Principal Solution Architect, to review cybersecurity best practices for school districts of comparable size. We’ll highlight:

  • Analysis and peer comparison of school district threat data
  • Threat intelligence trends and how they impact schools
  • Third-party and supply chain risks faced by schools
  • Best practices for identifying and mitigating these threats

Agenda

Wednesday, June 16, 2021

  • 11:30AM - 11:35AM CT
    Welcome and Introductions
  • 11:35AM - 12:20PM CT
    Cybersecurity Best Practices: K-12
  • 12:20PM - 12:30PM CT
    Q&A

Featured Speaker

Chris Montgomery
Chris Montgomery | Principal Solution Architect, Proofpoint, Inc.

Chris Montgomery is a Principal Solution Architect at Proofpoint, where he is responsible for the implementation and integration of all threat intelligence and intrusion detection solutions. In this role, he consults with security practitioners and OEM suppliers and focuses on utilizing threat intelligence to improve network security and the overall risk posture of an organization. Mr. Montgomery is a CCIE and holds several other industry certifications, including CISSP and ITIL.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or similar ISPs are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.