The evolving malware threat: Is your organisation protected from all angles?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The hybrid threat is complex and sophisticated – an email which delivers a web-based threat.  This type of attack is increasing dramatically as we use our web-browser as an imperative tool to work, live and play.  We access our emails and the web online, from wherever we happen to be. 

It is clear that as these attacks continue to evolve and become increasingly complex and sophisticated, an organisation’s defences also need to evolve. Please join us for an informative webinar to learn how you can better prepare for the complex threat environment of 2010. 

Topics to be discussed during this webinar include:

  • Malware attack trends for 2010, and examples from 2009
  • The evolving malware threat profile as it takes advantage of both email and web to reach its target
  • Why existing solutions are inefficient and how to protect your network

Learn first-hand from a panel of experts – who you will be able to quiz in a live question and answer session – about the trends in malware attacks and what you can do to better prepare your network to counter the new 2010 threat environment. 

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.


Photo of Fran Howarth

Fran Howarth

Snr Analyst, Security, Bloor Research

Jesse McCabe

Director of Product Marketing, Webroot

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.