Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Industrial Espionage, Weaponized Malware, and State-Sponsored Cyber Attacks: How to Identify, Counter, and React.

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

The information security industry has been issuing warnings of an increase in sophisticated state-sponsored cyber attacks in the wake of Flame.

Neither the U.S. or Israel have denied their role in the use of recently discovered weaponized malware. Add in to the mix the fact that India recently announced the empowerment of its government agencies to carry out state-sponsored cyberattacks, and suddenly political – and thus industrial – espionage has never been more of a threat.Join Infosecurity Magazine in a free one-hour webinar to take a detailed look at how weaponized malware is getting on to crucial systems and how you can protect against it.

You will learn:

    • How state-sponsored cyber attacks are succeeding
    • How weaponized malware is getting on to crucial systems
    • How you can protect against these attacks
    • How to recognize and identify these targeted attacks
    • How to counter against weaponized malware

Speakers

Tom Burton

Tom Burton Head of Cyber for Defence at BAE Systems Detica

    Vijay Rathour

    Vijay Rathour Vice President, Stroz Friedberg, London

      Righard Zwienenberg

      Righard Zwienenberg Senior Research Fellow

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.