The new normal - APTs

The new normal - APTs
The new normal - APTs
The new normal - APTS

Date: Mar. 28
Time: 2:00 p.m. ET / 11:00 a.m. PT

Click here to register for free

There's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to serve persistent threats that siphon data over a period of days, weeks, months and even years, victims must learn how to spot the attack and decide their next action. Should they force the miscreants out the door, monitor their activities a bit or take another option? For certain, building up security mechanisms that make it harder for these attackers to lob APTs at their organization is a must, but just what should this entail. We learn more.

Featured speakers:
William Hagestad, author, 21stCentury Chinese Cyber Warfare
Illena Armstrong, VP of editorial, SC Magazine

Sponsored by:


close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

APTs: The role of third-party apps

APTs: The role of third-party apps

Once an anomaly with which government agencies and some private companies that work with them had to deal, advanced persistent threats (APTs) are becoming a considerable problem for a spate ...

Guarding against a data breach

Guarding against a data breach

Our sixth-annual data breach survey, which polled IT security pros in the U.S. as well as those working in the U.K. and Australia, yielded interesting insights on how organizations are ...

20/20 Webcast: Cyber crime targets

20/20 Webcast: Cyber crime targets

Cyber criminals are evolving their tactics to take advantage of organizations' most obvious weakness: employees. As such, organizations must be concerned more than ever before about how users interact with ...