Events

Select the events you would like to attend and then click on the register button at the bottom of the page. Each event has a limited number of spots, so register early!

Select All Events

Phish Hunter Workshop (Option 1)
Description:

With over 250,000 credentials stolen every week and millions of new phishing websites infiltrating the Internet every year, organizations are being forced to reconsider their current threat protection strategies. Recent statistics show that phishing is a key component of more than 75% of breaches. We have recently announced the availability of the Phish Hunter service offering for Government Community Cloud customers.

As agencies modernize their technical infrastructure and migrate their business processes, computing, and data to the cloud - the risk landscape for cyber attacks, malware, and breach vulnerabilities has shifted. It is no longer sufficient to say that “We have a firewall, anti-virus, and disk encryption technology so we are secure.”

Targeted cyber-attacks will happen. Therefore, organizations must be able to prevent, detect and respond to breaches quickly. Phish Hunter is a comprehensive approach for combating compromised accounts using a variety of Microsoft platform security services. I have included a few resources here to learn about Phish Hunter.


Presenter: Steve Faehl
Event Date:
Duration: 120 minutes | Available seats: 20
Location: 12012 Sunset Hills Rd. Reston, VA 20190
  

Phish Hunter Workshop (Option 2)
Description:

With over 250,000 credentials stolen every week and millions of new phishing websites infiltrating the Internet every year, organizations are being forced to reconsider their current threat protection strategies. Recent statistics show that phishing is a key component of more than 75% of breaches. We have recently announced the availability of the Phish Hunter service offering for Government Community Cloud customers.

As agencies modernize their technical infrastructure and migrate their business processes, computing, and data to the cloud - the risk landscape for cyber attacks, malware, and breach vulnerabilities has shifted. It is no longer sufficient to say that “We have a firewall, anti-virus, and disk encryption technology so we are secure.”

Targeted cyber-attacks will happen. Therefore, organizations must be able to prevent, detect and respond to breaches quickly. Phish Hunter is a comprehensive approach for combating compromised accounts using a variety of Microsoft platform security services. I have included a few resources here to learn about Phish Hunter.


Presenter: Steve Faehl
Event Date:
Duration: 120 minutes | Available seats: 19
Location: 12012 Sunset Hills Rd. Reston, VA 20190