State of the Hack - Addressing the Advanced Persistent Threat

Share this article:
State of the Hack - Addressing the Advanced Persistent Threat
State of the Hack - Addressing the Advanced Persistent Threat
Click here to register for FREE

The Advanced Persistent Threat (APT) is a sophisticated and organized cyber attack to access and steal information from compromised computers.  The intruders responsible for the APT attacks target the Defense Industrial Base, financial industry, manufacturing industry, and research industry.  The attacks used by the APT intruders are not very different from any other intruder. The main differentiator is the APT intruder's perseverance and resources.  They have malicious code (malware) that circumvents common safeguards such as anti-virus, and they escalate their tools and techniques as a victim's capability to respond improves.  MANDIANT will discuss how they assist organizations in addressing the APT.

Featured speakers:
Travis Reese, VP of Federal Services & COO, MANDIANT
Sponsored by:

MANDIANT is an information security company providing software, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and several of the U.S.'s leading law firms. MANDIANT engineers and security consultants are acknowledged experts in incident response, computer forensics, network security and application security.  In addition to authoring eight books and numerous articles about rootkits, computer forensics and incident response, members of MANDIANT's team have been featured on news programs including CBS's 60 Minutes, CNN's Talkback Live, NBC News and FOX News.  MANDIANT operates office in the Washington, DC area, New York City and Los Angeles.  For more information about MANDIANT visit http://www.mandiant.com or read the MANDIANT blog, M-unition at http://blog.mandiant.com.


Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Vendor Webcasts

Sign up to our newsletters

More in Vendor Webcasts

The impact of endpoint data growth on corporate visibility & compliance

id you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?

Security in the new mobile ecosystem

A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.

Guidance on migration to SHA-2

Google has advised that Chrome will gradually sunset SHA-1 cryptography, which is used in the signing process of SSL certificates.