Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

From Targeted to Distributed - Raise your Defenses Against Zero-Day Malware

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Modern malware has evolved and mutated to be hard to detect, defend and protect against. Now to be sure that you are protected from the most common threat you need the best level of security, and is endpoint security like anti-malware really keeping up?

While statistics show that worms such as Conficker and even older malware cause a problem, malware has continued to evolve and as a result, your defenses need to do the same as ransomware, financial malware and botnets all have different behaviors, and require different level of defense.

In this webinar, we will look at the change from targeted malware to the malware that is randomly distributed, but arguably even more destructive to day to day operations.

Join this session to learn:

  • Why malware changed from targeted to randomly distributed malware
  • What defenses you need to survive different types of attacks
  • Advice on best practise cybersecurity defence
  • How to defend against evolving malware

Speakers

Andrew Hay

Chief Information Security Officer, DataGravity

    Shimon Noam Oren

    Head of Cyber Intelligence, Deep Instinct

      Dan  Raywood

      Contributing Editor, Infosecurity Magazine

      Brought to You by