State of the Hack - Addressing the Advanced Persistent Threat

Share this article:
State of the Hack - Addressing the Advanced Persistent Threat
State of the Hack - Addressing the Advanced Persistent Threat
Click here to register for FREE

The Advanced Persistent Threat (APT) is a sophisticated and organized cyber attack to access and steal information from compromised computers.  The intruders responsible for the APT attacks target the Defense Industrial Base, financial industry, manufacturing industry, and research industry.  The attacks used by the APT intruders are not very different from any other intruder. The main differentiator is the APT intruder's perseverance and resources.  They have malicious code (malware) that circumvents common safeguards such as anti-virus, and they escalate their tools and techniques as a victim's capability to respond improves.  MANDIANT will discuss how they assist organizations in addressing the APT.

Featured speakers:
Travis Reese, VP of Federal Services & COO, MANDIANT
Sponsored by:

MANDIANT is an information security company providing software, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and several of the U.S.'s leading law firms. MANDIANT engineers and security consultants are acknowledged experts in incident response, computer forensics, network security and application security.  In addition to authoring eight books and numerous articles about rootkits, computer forensics and incident response, members of MANDIANT's team have been featured on news programs including CBS's 60 Minutes, CNN's Talkback Live, NBC News and FOX News.  MANDIANT operates office in the Washington, DC area, New York City and Los Angeles.  For more information about MANDIANT visit http://www.mandiant.com or read the MANDIANT blog, M-unition at http://blog.mandiant.com.


Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Vendor Webcasts

Sign up to our newsletters

More in Vendor Webcasts

Data security and privacy: Key issues, challenges and responses

Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.

Top four recommendations to enhance your data security strategy

As the volumes of data in organizations continue to surge, being able to effectively protect sensitive information is becoming increasingly difficult.

Tapping global threat intelligence to secure enterprise networks

On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector