Understanding and Responding to Advanced Persistent Threats

High profile security breaches constantly make the headlines – but it is not always careless employees that give hackers the keys to the virtual city. Highly sophisticated malware and targeted attacks pose an increasing threat to enterprises.

Understanding how an advanced persistent threat (APT) works is the first step on the road to the achieving crucial security goals: discovery, containment and resolution. It is important to study how these attacks emerge, what form they take, the modus operandi of attackers, and what technologies exist for the purpose of tackling APTs.

This webinar will look at:

  • High profile incidents in the news and what the security industry can learn from them
  • How APTs work and what characteristics they exhibit
  • Techniques for combatting APTs, such as SSL visibility and analysis tools
  • How security teams can work most effectively to mitigate the APT risk

Speakers

Gregory  Nowak

Gregory Nowak Principal Research Analyst , Information Security Forum

    Bob Tarzey

    Analyst and Director, Quocirca

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.

    What’s Hot on Infosecurity Magazine?