Unknown Targeted Attacks - Stopping malware at the endpoint
Unknown Targeted Attacks - Stopping malware at the endpoint
Unknown Targeted Attacks – Stopping malware at the endpoint

Date: Apr. 9
Time: 2:00 p.m. ET / 11:00 a.m. PT

Click here to register for free

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen.  Organizations must ask themselves “Can endpoint security products that are based on a signature/reputation based approach identify and stop targeted attacks launched by well-funded, motivated, sophisticated attackers?”

If your organization was targeted and penetrated by an APT attack, would you know?

These new attackers are skilled, well-funded and patient.  They will try several avenues of attack and they are quite likely to succeed.  They exploit employee knowledge gaps, process weaknesses and technology vulnerabilities in random combinations.  When it comes to combatting APTs the odds are against your organization's security team. 

The current industry buzz seems to be that you should assume APTs will succeed, breaches will occur and you should focus on mitigating the consequences with logging and a good SIEM. 

There is an alternative – Endpoint Behavioral Protection.

This webinar will focus on how to understand and defend your organization against APTs:

  • First, the guest speaker, the Information Security Manager of a major retail organization, will reflect on the approach that they have taken to designing, implementing and managing a multi-layered defense strategy for headquarters computers and remote store systems including:
    • Their assessment of the risks that they have faced, are addressing now and anticipate dealing with going forward
    • The security layers that they have implemented both at the network and endpoints and the role of each
    • Their experience with endpoint behavioral protection and how it has protected them
      • How they know that the behavioral layer is providing value
      • Does AV still provide protection that makes it an essential part of a protection strategy

  • The challenges of working with multiple products from multiple vendors

  • Second, there will be a technical presentation of the elements of endpoint behavioral protection and what they do to provide proactive dynamic protection against unknown attacks without a requirement for signature updates – how do they identify unknown attacks and how do they stop them?
    • Requirements:
      • Signature-less defenses
      • Detection, Protection and Remediation
      • High Detection Accuracy
      • Low false positives
      • Small footprint on the protected computer
      • Stopping inbound and outbound

  • This will include analysis, dissection and discussion of some very public APT attacks like the RSA attack and Duqu
    • How do these attacks work?
    • Could they have been stopped?

Featured speakers:
Don Wheatley, information security manager, retail organization
Robert Foley, president, Matrix Global Partners
Faycal Daira, CTO, Matrix Global Partners

Sponsored by: