Industrial Espionage, Weaponized Malware, and State-Sponsored Cyber Attacks: How to Identify, Counter, and React.

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The information security industry has been issuing warnings of an increase in sophisticated state-sponsored cyber attacks in the wake of Flame.

Neither the U.S. or Israel have denied their role in the use of recently discovered weaponized malware. Add in to the mix the fact that India recently announced the empowerment of its government agencies to carry out state-sponsored cyberattacks, and suddenly political – and thus industrial – espionage has never been more of a threat.Join Infosecurity Magazine in a free one-hour webinar to take a detailed look at how weaponized malware is getting on to crucial systems and how you can protect against it.

You will learn:

    • How state-sponsored cyber attacks are succeeding
    • How weaponized malware is getting on to crucial systems
    • How you can protect against these attacks
    • How to recognize and identify these targeted attacks
    • How to counter against weaponized malware

Speakers

Tom Burton

Head of Cyber for Defence at BAE Systems Detica

Vijay Rathour

Vice President, Stroz Friedberg, London

Righard Zwienenberg

Senior Research Fellow

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.