The Role of Malware in Intelligence Operations

Presented by

Dr. Kenneth Geers, Chief Research Scientist Comodo Cybersecurity

About this talk

Imagine you are King or Queen for a day. How would you employ the time and talent of computer hackers? Whom would you target, with what type of malware, and for what purpose? Where would you set technical, legal, and ethical constraints? This presentation will examine the role of malicious software in real-world nation-state intelligence operations. Information Technology continuously transforms the nature of statecraft, from external threats to internal security. Please join noted author and speaker, Dr. Kenneth Geers as he will clarify: •The roles and risks of law enforcement, counterintelligence, and foreign intelligence operations in the Internet era •We will consider the attack and defense of everything in a modern state, from elections to electricity •And we will discuss how enterprises can and should respond to a threat that has no fear of prosecution or retaliation

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (10)
Subscribers (2306)
In a world where preventing all cyberattacks is impossible, Comodo Cybersecurity provides active breach protection with its cloud-delivered Cybersecurity Platform. The Comodo Cybersecurity Platform provides a zero trust security environment that verdicts 100% of unknown files. The platform renders an almost immediate verdict on the status of any unknown file, so it can be handled accordingly by either software or human analysts. This shift from reactive to proactive is what makes Comodo Cybersecurity unique and gives us the capacity to protect your business – from network to web to cloud – with confidence and efficacy. Comodo has experts and analysts in 185 countries, protecting 100 million endpoints and serving 200,000 customers globally. Based in Clifton, New Jersey, Comodo Cybersecurity has a 20-year history of protecting the most sensitive data for both businesses and consumers worldwide.