Eleanor Dallaway


Righard Zwienenberg

Senior Research Fellow

Brian Honan

Consultant, BH Consulting

Tom Burton

Head of Cyber for Defence at BAE Systems Detica

Vijay Rathour

Vice President, Stroz Friedberg, London


Industrial Espionage, Weaponized Malware, and State-Sponsored Cyber Attacks: How to Identify, Counter, and React.

Date: 31 July 2012, 3.00pm BST
Duration: 1 hours

View recording

The information security industry has been issuing warnings of an increase in sophisticated state-sponsored cyber attacks in the wake of Flame.

Neither the U.S. or Israel have denied their role in the use of recently discovered weaponized malware. Add in to the mix the fact that India recently announced the empowerment of its government agencies to carry out state-sponsored cyberattacks, and suddenly political – and thus industrial – espionage has never been more of a threat.Join Infosecurity Magazine in a free one-hour webinar to take a detailed look at how weaponized malware is getting on to crucial systems and how you can protect against it.

You will learn:

    • How state-sponsored cyber attacks are succeeding
    • How weaponized malware is getting on to crucial systems
    • How you can protect against these attacks
    • How to recognize and identify these targeted attacks
    • How to counter against weaponized malware

View recording

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×