Click here to register
Date: Wednesday, December 10, 2014
Time: 2:00 PM ET / 11:00 AM PT
Cybercriminals often target those areas of a network that pose the least resistance to get what they're after – usually the personally identifiable information of customers and employees, trade secrets, intellectual property and still other critical data. Their tactics most often involve advanced persistent threat (APT) attacks. And, this barrage of targeted attack is difficult – if not impossible – for organizations to prevent as current technological controls are far from keeping pace with these steady incursions. As a result, the sources of APT attacks – such as malware and application exploits – are causing considerable trouble for information security leaders and the companies for which they work. Indeed, accounting for our wide-ranging networks and then trying to protect all the potential conduits of entry is a complex problem. This webcast will discuss the various ways APTs are still confounding some organizations and we will explore the various methods and technologies that might prove more successful in confronting them.
Jim Cupps, Enterprise Information Security, Liberty Mutual
Paul Bartruff, Systems Engineer, ThreatTrack Security