The new normal - APTs

Share this article:
The new normal - APTs
The new normal - APTs
The new normal - APTS

Date: Mar. 28
Time: 2:00 p.m. ET / 11:00 a.m. PT

Click here to register for free

There's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to serve persistent threats that siphon data over a period of days, weeks, months and even years, victims must learn how to spot the attack and decide their next action. Should they force the miscreants out the door, monitor their activities a bit or take another option? For certain, building up security mechanisms that make it harder for these attackers to lob APTs at their organization is a must, but just what should this entail. We learn more.

Featured speakers:
William Hagestad, author, 21stCentury Chinese Cyber Warfare
Illena Armstrong, VP of editorial, SC Magazine

Sponsored by:


Share this article:
close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Make It Stop! Protecting Corporate Data Assets Against Breach

SCMagazine's 2014 Data Breach Survey shows companies are taking steps to raise security awareness and investing in IT security and risk management practices but given the number of breaches and other high profile cyber crimes that have occurred more recently, are they doing enough?

Compliance gets you on the road to security

Today there is a veritable alphabet soup of data security standards and laws governing how companies must operate. But, most agree, compliance is more of a first step to security rather than an assurance of security itself.

Battling savvy cyber thieves

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends.