You're invited

Proofpoint Spotlight:
Emerging Threats
Intelligence for SLED

Zoom | Thursday, May 20, 2021 | 12:00PM - 1:00PM PT


Today’s advanced attacks are launched with increasing frequency by cybercriminals who have many different motives and use multiple techniques. Each campaign uses botnets, proxies, attack vectors and command and control systems in a unique way, making it nearly impossible to keep pace with changes in the threat landscape.

Join your peers in State, Local, and Education (SLED) at Proofpoint Spotlight: Emerging Threats Intelligence for SLED, where you’ll have the opportunity to learn how Proofpoint threat intelligence feeds, which are based on behavior observed directly by Proofpoint ET Labs, can all be directly fed to SIEMs, firewalls, intrusion detection systems (IDS), intrusion protection systems (IPS) and authentication systems.

We’ll discuss how threat intelligence feeds can bolster your security by:

  • Increasing the ROI of your network security with a simple and easy-to-consume malware-focused rule set
  • Adopting a proactive security posture based on real intelligence
  • Ensuring your prevention devices are performing as they should by looking for indicators of post-compromise activity
  • Enriching existing log data with a global perspective on suspicious IP addresses and domains
  • Enforcing security policies based on threat categories that matter to you

Agenda

May 20

  • 12:00PM - 12:05PM PT
    Welcome and Introductions
  • 12:05PM - 12:50PM PT
    Proofpoint Emerging Threats Intelligence
  • 12:50PM - 1:00PM PT
    Q&A

Featured Speaker

Gary Poduska | Senior Sales Engineer, Proofpoint, Inc.

Gary Poduska has over 20 years of data security experience working in the private sector, education and government. In his current role at Proofpoint, Gary works on the sales engineering team focused on Threat Intelligence.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or similar ISPs are not accepted.
(ISC)2 CPE Logo

Earn CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.