Date: Wednesday, December 11, 2013
Time: 11 a.m. PT / 2 p.m. ET
With simple viruses and Trojans were all the rage, life was simpler for the average CSO. Now, threats of all types abound and the methods cyber attackers enlist to infiltrate networks have only become more varied, often a bit more sophisticated and most assuredly more frequent. One of the most problematic has proven to be APTs. While the method of entry may vary – from social engineering to exploitation of a vulnerability, advanced persistent threats enable attackers to remain longer inside compromised infrastructures by coming under the radar of most detection mechanisms today. This allows them to quietly and methodically siphon off whatever critical data, often over whatever period of time they wish, without nary an interfering hand from most security controls. However, there are steps you can take to better combat these threats and stop them in their tracks when they do hit your organization up. We hear from a leading industry expert just some of the ways to do this.
Phillip Ferraro, vice president & global chief information security officer, Las Vegas Sands Corp.
Paul Kaspian, senior product marketing manager, IBM Security Solutions
Illena Armstrong, VP, editorial, SC Magazine