SC Magazine 20/20: Evolution of crime

SC Magazine 20/20: Evolution of crime
SC Magazine 20/20: Evolution of crime
SC Magazine is pleased to introduce a unique webcast series celebrating its 20th Anniversary this year. The free 20-minute webcasts will feature a member of the SC Magazine editorial team in conversation with various industry thought leaders discussing the past, present and future of IT security.

Evolution of crime

Live Date: Thursday, Dec. 3, 2009
Time: 2:00 p.m. ET/11:00 a.m. PT

Click here to view this webcast on demand.

Cybercriminals have evolved with the times over these last 20 years. As our dependence on the internet grew, so too did their knack for engineering innovative and effective attacks. We've gone from the simple days of the Lovebug virus and teenaged thrill-seekers to organized cybergangs and online thieves who have established viable businesses of their own that make huge profits stealing, selling and using critical corporate and customer data from organizations. Tune in to find out:

  • How the methods of attack have changed and why?
  • What types of deficiencies in corporate infrastructures do cybercriminals take advantage of most today?
  • What can information security leaders do to mitigate against these and other rising threats?

Featured speakers
Illena Armstrong,
editor in chief, SC Magazine
Morey Haber, VP of product management, eEye


Sponsored by

eEye Digital Security is the global leader in the next generation of security solutions: comprehensive vulnerability management and zero-day endpoint security protection. eEye enables secure computing through world-renowned research and innovative technology, supplying the world's largest businesses with an integrated and research-driven vulnerability assessment, intrusion prevention, asset security and compliance solutions. The endpoint to vulnerability starts here.


close

Next Article in Editorial Webcasts

More in Editorial Webcasts

Counter malware threats and protect your business

Counter malware threats and protect your business

The cyber security threats with which information security pros must contend run the gamut from web-based malware to application vulnerabilities. Both traditional and ever-new methods are being used by cyber ...

APTs: The role of third-party apps

APTs: The role of third-party apps

Once an anomaly with which government agencies and some private companies that work with them had to deal, advanced persistent threats (APTs) are becoming a considerable problem for a spate ...

The new normal - APTs

The new normal - APTs

There's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to ...