Anatomy of an Attack – How to defend against a multi-stage attack

Presented by

Michael Osterman, Principle - Osterman Research

About this talk

Recently, we’ve seen the emergence of multi-stage attacks, such as the widely reported Target breach. Multi-stage attacks employ multiple technologies, deployed in multiple stages, to penetrate an organization’s defenses. For example, a phishing email can result in a malware download which, in turn, can collect and transfer credit card data to an external server. In this session, respected industry analyst Michael Osterman will examine the anatomy of a multi-stage attack and describe how an organization can employ a defense- in-depth strategy to block the attempt to compromise your security at each stage. Join this webinar on Anatomy of an Attack as: •You will learn details of how a multi-stage attack works. • Examine the vulnerabilities which each stage of the attack is targeting. •Learn how to protect each stage in a coordinated defense. This session is a must-see for any IT or security professional concerned with protecting an organization against the type of sophisticated, multi-stage attack which resulted in the breach of more than 40 million credit card numbers.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (123)
Subscribers (12046)
Security Connected provides McAfee customers the ability achieve optimized security each day, enabling their business while reducing risk, driving compliance and realizing operational efficiencies