Threat Intelligence Briefing:
State of SLED

Zoom | Thursday, February 4, 2021 | 12:00PM-1:00PM ET

A monumental shift is taking place in the threat landscape. While email remains the dominant vector for malware and phishing attacks across all sectors, network and web-based threats are also increasingly targeting the heterogeneous, distributed environments of State, Local and Education (SLED) organizations.

New threats and tactics are always emerging, but attack surfaces changed dramatically as organizations worldwide were forced to shift to a remote workforce model. This rendered traditional network-based security technologies ineffective. We saw new, high-profile breaches—targeting state and local government agencies as well as the higher education and K12 entities—that demonstrated that there was a gap in security.

Join Paul Wang, Proofpoint Threat Analyst, to review 2020 threats and discuss 2021 predictions. We’ll highlight:

  • The latest threat intelligence trends pertaining to nation-state and criminal threat actors, with a focus on how they impact state and local governments
  • The risks faced by educational institutions and state and local agencies as they navigate today’s complex threat landscape
  • The techniques and tactics that will be used by threat actors

Agenda

February 4, 2021

  • 12:00PM-12:05PM
    Welcome & Introductions
     
  • 12:05PM-12:50PM
    Threat Intelligence Briefing: State of SLED
     
  • 12:50PM-1:00PM
    Q&A

Featured Speaker

Paul Wang
Paul Wang | Threat Analyst, Proofpoint, Inc.

Paul Wang is a Threat Analyst at Proofpoint with experience both in computer network defense as well as malware analysis. He comes from a background of signature development and enterprise analytics. He specializes in performing digital examinations in support of intrusions, criminal investigations and intelligence management for high profile companies and federal networks. He has contributed to many published whitepapers and continues to help organizations protect the safety of their users.

Who Should Attend

This event is suitable for information security decision makers, including: CXO, VP of IT, Director of IT; mid-level information security management (Senior Security Manager, IT Security Manager, IT Manager) and technical information security practitioners (Security Engineer, Messaging Architect, IT Analyst).
(ISC)2 CPE Logo

Earn 2 CPE Credits

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.