How do you top 2011 for the hacks at HBGary, RSA, Sony, Epsilon, Comodo, DigiNotar, the never-ending hactivism by Anonymous, the discovery of DuQu – Son of Stuxnet, and the rise of Android malware?
You start out 2012 by casually scanning QR-Code’s, by not addressing the explosive growth of BYOD, by still relying on clearly outdated, ineffective, obsolete defenses and by foolishly thinking that your company is to small to be a target…
This presentation discuses the current malware and hacking trends as we move in to 2012 and how our defenses must be adjusted to counter the evolving threat landscape.
Advanced persistent threats (APTs) like Stuxnet and Duqu have caused many software-producing organizations to re-examine their code signing operations – specifically the security of private signing keys that underpin the integrity of the entire process. What many don’t realize is that they can both increase the assurance level of their code signing AND simplify and automate their code signing workflows at the same time!
Join Thales security expert Peter DiToro on April 24, 2012 at 2:00pm EST for an informative session where you will learn how to:
• Provide high assurance protection for private code signing keys and digital signature operations
• Automate and simplify code signing workflows in multi-workstation environments
• Apply cryptographic best practices to significantly reduce the risk of malicious software alteration and protect your brand.