Stop Spear-Phishing - Put the User in a Bubble

Share this article:
Stop Spear-Phishing - Put the User in a Bubble
Stop Spear-Phishing - Put the User in a Bubble

Stop Spear-Phishing - Put the User in a Bubble

Date: Tuesday, Feb. 12, 2013
Time: 2:00 p.m ET / 11:00 a.m. PT

Click here to register for free

Your employees are the primary target of attack by a variety of adversaries bent on doing your organization harm. This is a fact that simply cannot be challenged based on the last 24-36 months worth of breach disclosures. Spear-phishing has been at the root of virtually every major attack disclosed during this time - whether the RSA breach, the recent campaign disclosed by Kaspersky labeled "Red October," the "Nitro" attacks, attacks against the energy sector, etc, etc. When spear-phishing isn't used, other techniques aimed at the user such as watering hole attacks are employed. We've got a user problem on our hands that we need to rapidly solve.

We're currently losing the battle to our adversaries because the endpoint has become the new perimeter and our endpoint defenses are largely antiquated. However, innovation is here that you must take a look at...

Join Doug DeGrote, CISO at XCel Energy and Anup Ghosh, Founder and CEO at Invincea, for an informative discussion that will cover:

  • Recent examples of user-targeted attacks and thoughts on why they've succeeded
  • Thoughts directly from a leading CISO on how to tackle the user problem through a combination of training AND new technology deployments
  • How advances in virtualization enable the creation of segregated environments for your users to run highly-targeted applications such as the web browser, PDF reader, Office suite, etc.
  • How behavioral-based malware detection is being used in these segregated environments to spot and kill zero-days - including the recently announced Java 7 exploit
  • Methods for turning thwarted attacks into rich forensic information that can feed your entire infrastructure and extend its usefulness

Featured Speakers:
Doug DeGrote, CISO, XCel Energy
Anup Ghosh, Ph.D., founder and CEO, Invincea

Sponsored by:

Share this article:

Sign up to our newsletters

More in Vendor Webcasts

Threat intelligence revolution

Real-world intelligence has been used for thousands of years to thwart an enemy's intentions. With the evolving sophistication of cyber threats growing at a rapid pace, today, internet and network connectivity has become the lifeblood of enterprise operations.

How PCI 3.0 impacts your security posture & compliance

During this webinar Christopher Strand, Senior Director of Compliance at Bit9 + Carbon Black and Mordecai Kraushar, Director of Audit at CipherTechs will review how the update to PCI DSS 3.0 will impact your systems and cybersecurity.

Persistent Threats are ever evolving. Is your security?

These are trying times for IT professional. Each and every day you face the risk of your network being hacked by the newest zero-day threat. Recently, it was the HeartBleed bug and then the IE vulnerability.