Threat Intelligence Briefing:
State, Local and Education (SLED)

Zoom | Tuesday, April 27, 2021 | 11:00AM - 12:00PM ET

Most state and local governments and educational institutions and districts depend on a variety of external vendors and partners to support their business activities. These interdependent relationships form a complex third-party ecosystem called the supply chain. Because of its complexity, the supply chain is an attractive target for cybercriminals.

While the security industry has made significant progress thwarting generalized email attack campaigns, more directed impersonation and business email compromise (BEC) attacks are harder to detect and are increasing in virulence. And, given that email impersonating a trusted business partner is more likely to trick the target into taking an unauthorized action, it’s time to shine more light on the supply chain as an abuse vector.

Join Chris Montgomery, Proofpoint Principal Solution Architect, to review 2020 threats and discuss 2021 predictions. We’ll highlight:

  • The evolution of the threat landscape for 2021
  • Threat intelligence trends, with a focus on how they impact SLED organizations
  • Third-party and supply chain risks faced by SLED organizations as they navigate today’s complex threat landscape
  • Top resources and key actions you can take to prepare your organization


April 27

  • 11:00AM - 11:05AM ET
    Welcome and Introductions
  • 11:05AM - 11:50AM ET
    Evolution of the Threat Landscape for 2021
  • 11:50AM - 12:00PM ET


Chris Montgomery
Chris Montgomery | Principal Solution Architect, Proofpoint, Inc.

Chris Montgomery is a Principal Solution Architect at Proofpoint, where he is responsible for the implementation and integration of all threat intelligence and intrusion detection solutions. In this role, he consults with security practitioners and OEM suppliers and focuses on utilizing threat intelligence to improve network security and the overall risk posture of an organization. Mr. Montgomery is a CCIE and holds several other industry certifications, including CISSP and ITIL.

Who Should Attend

This event is suitable for Proofpoint customers who are responsible for protecting sensitive data, regulatory compliance, addressing evolving threats, improving/automating security operations, addressing cloud-related security issues, and improving the ability to analyze security data and detect attacks in real time.

NOTE: Registration requires a valid email address from your organization’s domain. Gmail, Hotmail, AOL, Yahoo or any other ISP are not accepted.
(ISC)2 CPE Logo

Earn 1 CPE Credit

This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within 4-6 weeks.