State of the Hack - Addressing the Advanced Persistent Threat

Share this article:
State of the Hack - Addressing the Advanced Persistent Threat
State of the Hack - Addressing the Advanced Persistent Threat
Click here to register for FREE

The Advanced Persistent Threat (APT) is a sophisticated and organized cyber attack to access and steal information from compromised computers.  The intruders responsible for the APT attacks target the Defense Industrial Base, financial industry, manufacturing industry, and research industry.  The attacks used by the APT intruders are not very different from any other intruder. The main differentiator is the APT intruder's perseverance and resources.  They have malicious code (malware) that circumvents common safeguards such as anti-virus, and they escalate their tools and techniques as a victim's capability to respond improves.  MANDIANT will discuss how they assist organizations in addressing the APT.

Featured speakers:
Travis Reese, VP of Federal Services & COO, MANDIANT
Sponsored by:

MANDIANT is an information security company providing software, professional services and education to Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments and several of the U.S.'s leading law firms. MANDIANT engineers and security consultants are acknowledged experts in incident response, computer forensics, network security and application security.  In addition to authoring eight books and numerous articles about rootkits, computer forensics and incident response, members of MANDIANT's team have been featured on news programs including CBS's 60 Minutes, CNN's Talkback Live, NBC News and FOX News.  MANDIANT operates office in the Washington, DC area, New York City and Los Angeles.  For more information about MANDIANT visit http://www.mandiant.com or read the MANDIANT blog, M-unition at http://blog.mandiant.com.


Share this article:
close

Next Article in Vendor Webcasts

Sign up to our newsletters

More in Vendor Webcasts

Life after a data breach: Identifying and containing advanced threats at the ...

Compromise can happen in seconds and containment can take weeks. For enterprises, it's no longer a matter of if you will be breached, but rather a matter of when.

Big Data - Your secret weapon in the war against cyber crime

Right now, Web attackers are amassing a global arsenal of knowledge and resources that is allowing them to expanding their reach well beyond financial services to virtually every industry, everywhere.

The one-man SOC: Habits of highly effective security practitioners

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key.