The new normal - APTs

The new normal - APTs
The new normal - APTs
The new normal - APTS

Date: Mar. 28
Time: 2:00 p.m. ET / 11:00 a.m. PT

Click here to register for free

There's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to serve persistent threats that siphon data over a period of days, weeks, months and even years, victims must learn how to spot the attack and decide their next action. Should they force the miscreants out the door, monitor their activities a bit or take another option? For certain, building up security mechanisms that make it harder for these attackers to lob APTs at their organization is a must, but just what should this entail. We learn more.

Featured speakers:
William Hagestad, author, 21stCentury Chinese Cyber Warfare
Illena Armstrong, VP of editorial, SC Magazine

Sponsored by:


close

Next Article in Editorial Webcasts

More in Editorial Webcasts

Counter malware threats and protect your business

Counter malware threats and protect your business

The cyber security threats with which information security pros must contend run the gamut from web-based malware to application vulnerabilities. Both traditional and ever-new methods are being used by cyber ...

APTs: The role of third-party apps

APTs: The role of third-party apps

Once an anomaly with which government agencies and some private companies that work with them had to deal, advanced persistent threats (APTs) are becoming a considerable problem for a spate ...

Guarding against a data breach

Guarding against a data breach

Our sixth-annual data breach survey, which polled IT security pros in the U.S. as well as those working in the U.K. and Australia, yielded interesting insights on how organizations are ...