Anatomy of an Attack – How to defend against a multi-stage attack
Presented by
Michael Osterman, Principle - Osterman Research
About this talk
Recently, we’ve seen the emergence of multi-stage attacks, such as the widely reported Target breach. Multi-stage attacks employ multiple technologies, deployed in multiple stages, to penetrate an organization’s defenses. For example, a phishing email can result in a malware download which, in turn, can collect and transfer credit card data to an external server.
In this session, respected industry analyst Michael Osterman will examine the anatomy of a multi-stage attack and describe how an organization can employ a defense- in-depth strategy to block the attempt to compromise your security at each stage.
Join this webinar on Anatomy of an Attack as:
•You will learn details of how a multi-stage attack works.
• Examine the vulnerabilities which each stage of the attack is targeting.
•Learn how to protect each stage in a coordinated defense.
This session is a must-see for any IT or security professional concerned with protecting an organization against the type of sophisticated, multi-stage attack which resulted in the breach of more than 40 million credit card numbers.
Security Connected provides McAfee customers the ability achieve optimized security each day, enabling their business while reducing risk, driving compliance and realizing operational efficiencies…