Is Your Advanced Persistent Threat Strategy Still Leaving the Door Open?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Today, every business and government is a target for data theft. Research shows 100% of all advanced attacks are a result of credential compromises and organizations are racing to add new layers of security to help detect and respond. But, are you still leaving the door open to advanced persistent threats (APTs) and targeted attacks?

According to the Common Computing Security Standards (CCSS) Forum, attacks on keys and certificates in the first five months of 2013 are exploding at an annualized growth rate of over 600%. In just one month, Symantec identified over 800 different malware packages designed to steal keys and certificates.

In addition to learning more about how we’ve given attackers the ideal vulnerability that we have no means to control or respond to, you will also learn:

  • Why trust established by keys and certificates is the perfect target of attack
  • How keys and certificates are poisoned against your organization
  • How the lack of visibility and inability to respond make keys and certificates the ideal APT attack vector
  • Alarming metrics on the cost of failed trust
  • What strategies can help improve the effectiveness of your APT strategy

Failing to get a handle on this gaping hole means leaving the door open to APTs. Join Infosecurity magazine, Dr. Larry Ponemon, and Kevin Bocek, Venafi Head of Threat Research, as we discuss research on cybercriminals actively exploiting keys and certificates, how even today’s best APT strategies still don’t address this problem, and how new research show the tremendous impact and real danger of failing to take action now. Register now to learn how to strengthen your APT strategy.




Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Kevin Bocek

Vice President, Product Marketing, Venafi

    Larry Ponemon

    Chairman and Founder, Ponemon Institute

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.