Virtual Meeting

Zoom | Wednesday, March 10, 2021 | 11:30AM - 12:15PM CT

Most agencies depend on a variety of external vendors and partners to support their business activities. These interdependent relationships form a complex third-party ecosystem called the supply chain. Because of its complexity, the supply chain is an attractive target for cybercriminals.

While the security industry has made significant progress thwarting generalized email attack campaigns, more directed impersonation and business email compromise (BEC) attacks are harder to detect and are increasing in virulence. And, given that email impersonating a trusted business partner is more likely to trick the target into taking an unauthorized action, it’s time to shine more light on the supply chain as an abuse vector.

Join Chris Montgomery, Proofpoint Principal Solution Architect, to review 2020 threats and discuss 2021 predictions. We'll highlight:

  • The evolution of the threat landscape for 2021
  • Threat intelligence trends, with a focus on how they impact local governments
  • Third party and supply chain risks faced by local agencies as they navigate today’s complex threat landscape
  • Top resources and key actions you can take to prepare your agency


Agenda

March 10

  • 11:30AM-11:35PM CT
    Welcome and Introductions
  • 11:35PM-12:10PM CT
    Evolution of the Threat Landscape for 2021
  • 12:10PM-12:15PM CT
    Q&A

Featured Speaker

Chris Montgomery
Chris Montgomery | Principal Solution Architect, Proofpoint, Inc.

Chris Montgomery is a Principal Solution Architect at Proofpoint where he is responsible for the implementation and integration of all threat intelligence and intrusion detection solutions. In this role, he can be found consulting with security practitioners and OEM suppliers focused on utilizing threat intelligence to improve network security and the overall risk posture of an organization. Mr. Montgomery is a CCIE, and holds several other industry certifications, including CISSP and ITIL.

Who Should Attend

This event is suitable for Proofpoint customers who are responsible for protecting sensitive data, regulatory compliance, addressing evolving threats, improving/automating security operations, addressing cloud-related security issues, and improving the ability to analyze security data and detect attacks in real time.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn CPE Credits

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.