The new normal - APTs

Share this article:
The new normal - APTs
The new normal - APTs
The new normal - APTS

Date: Mar. 28
Time: 2:00 p.m. ET / 11:00 a.m. PT

Click here to register for free

There's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to serve persistent threats that siphon data over a period of days, weeks, months and even years, victims must learn how to spot the attack and decide their next action. Should they force the miscreants out the door, monitor their activities a bit or take another option? For certain, building up security mechanisms that make it harder for these attackers to lob APTs at their organization is a must, but just what should this entail. We learn more.

Featured speakers:
William Hagestad, author, 21stCentury Chinese Cyber Warfare
Illena Armstrong, VP of editorial, SC Magazine

Sponsored by:


Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Leveraging big data governance

Managing the vast volumes of data -- both customer and corporate -- on which most organizations depend for their day-to-day operations and long-term growth of their businesses always has been challenging.

Protecting your core assets

Maintaining even the most basic IT security controls is becoming more challenging for organizations as cloud computing, mobile and bring-your-own-device (BYOD) reshape the average corporate network and how it is used.

Wanted: Buy-in from the board

As massive breaches occur with more frequency, consumers have become increasingly anxious about just how large retail, financial and other companies with which they're dealing are protecting their personal information.