Click here to register

Date:
Tuesday, March 11, 2014
Time:
2:00 p.m ET / 11:00 a.m. PT

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends. From targeting specific employees with convincing phishing emails that encourage them to download malware-riddled attachments to taking advantage of vulnerable web apps, these miscreants find myriad ways to gain entry to networks so that they can siphon off sensitive data – most often unnoticed for days, weeks or even months. Implementing a combination of just the right policies and plans, along with the most effective technologies to support them, is paramount. In this 20/20, we talk to a leading industry expert to learn how cyber crooks are making off with critical data and what methods and types of technologies you should consider to stop them in their tracks.



Sponsored by: