Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Is Your Advanced Persistent Threat Strategy Still Leaving the Door Open?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Today, every business and government is a target for data theft. Research shows 100% of all advanced attacks are a result of credential compromises and organizations are racing to add new layers of security to help detect and respond. But, are you still leaving the door open to advanced persistent threats (APTs) and targeted attacks?

According to the Common Computing Security Standards (CCSS) Forum, attacks on keys and certificates in the first five months of 2013 are exploding at an annualized growth rate of over 600%. In just one month, Symantec identified over 800 different malware packages designed to steal keys and certificates.

In addition to learning more about how we’ve given attackers the ideal vulnerability that we have no means to control or respond to, you will also learn:

  • Why trust established by keys and certificates is the perfect target of attack
  • How keys and certificates are poisoned against your organization
  • How the lack of visibility and inability to respond make keys and certificates the ideal APT attack vector
  • Alarming metrics on the cost of failed trust
  • What strategies can help improve the effectiveness of your APT strategy

Failing to get a handle on this gaping hole means leaving the door open to APTs. Join Infosecurity magazine, Dr. Larry Ponemon, and Kevin Bocek, Venafi Head of Threat Research, as we discuss research on cybercriminals actively exploiting keys and certificates, how even today’s best APT strategies still don’t address this problem, and how new research show the tremendous impact and real danger of failing to take action now. Register now to learn how to strengthen your APT strategy.

 

 

Speakers

Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Kevin Bocek

Vice President, Product Marketing, Venafi

    Larry Ponemon

    Chairman and Founder, Ponemon Institute

      Brought to You by