Understanding and Responding to Advanced Persistent Threats

High profile security breaches constantly make the headlines – but it is not always careless employees that give hackers the keys to the virtual city. Highly sophisticated malware and targeted attacks pose an increasing threat to enterprises.

Understanding how an advanced persistent threat (APT) works is the first step on the road to the achieving crucial security goals: discovery, containment and resolution. It is important to study how these attacks emerge, what form they take, the modus operandi of attackers, and what technologies exist for the purpose of tackling APTs.

This webinar will look at:

  • High profile incidents in the news and what the security industry can learn from them
  • How APTs work and what characteristics they exhibit
  • Techniques for combatting APTs, such as SSL visibility and analysis tools
  • How security teams can work most effectively to mitigate the APT risk

Speakers

Photo of Gregory  Nowak

Gregory Nowak

Principal Research Analyst, Information Security Forum

Photo of Bob Tarzey

Bob Tarzey

Analyst and Director, Quocirca

Brought to you by

What’s hot on Infosecurity Magazine?