SC Magazine eSymposium: Advanced persistent threats

Register here:

Location: Your computer
Earn CPE credits for attending

Advanced persistent threat (APT) attacks are insidious. Using such tried-and-true methods as social engineering to gain entry to enterprise networks, cybercriminals can easily siphon off identities and other information for their financial gain. That's because these adversaries will go to great lengths to identify weakness within a high-value target. The challenge with APT incursions is that once an attack has commenced, it usually requires an IT administrator to notice anomalies in outbound data before anyone realizes there is a problem. Some companies are getting a handle on these attackers and their methods. We look to them to help us better equip other security teams to address these threats.

Platinum Sponsors:
EiQ Networks
HP TippingPoint
ThreatTrack Security

SC Congress 24/7 exhibitors:
Forum Systems
Trend Micro

What to expect

Main Hall

Welcome to the SC Congress 24/7. The always-on resource for IT professionals.

Exhibition Hall

Chat with our exhibitors during the live events.

Conference Hall

Stay current with industry trends by our industry experts.


Network with your peers using the latest virtual environment technology.

Resource Center

Download pertinent collateral on the event topics discussed.


Chat with SC Magazine’s team!