SC Magazine eSymposium: Advanced persistent threats
Cyber criminals enlisting APTs are of a different ilk. Often patient and much more technically advanced, they infiltrate networks and surreptitiously steal critical data bit by bit, day by day, month by month. If a company reacts to hastily after discovering them, they can quickly modify the coding on which their attacks are based and become well-hidden once again. Some companies are getting a handle on these attackers and their methods. We look to them to help us better equip other security teams to address these threats.
Bit9 + Carbon Black
HP Tipping Point
Palo Alto Networks
SC Congress 24/7 exhibitors: