Date: Mar. 28
Time: 2:00 p.m. ET / 11:00 a.m. PT
Click here to register for freeThere's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to serve persistent threats that siphon data over a period of days, weeks, months and even years, victims must learn how to spot the attack and decide their next action. Should they force the miscreants out the door, monitor their activities a bit or take another option? For certain, building up security mechanisms that make it harder for these attackers to lob APTs at their organization is a must, but just what should this entail. We learn more.
William Hagestad, author, 21stCentury Chinese Cyber Warfare
Illena Armstrong, VP of editorial, SC Magazine