Hi [[ session.user.profile.firstName ]]

Defending Against Persistent Attackers: The Need for Incident Response 360°

Every day nation-states and other cyber-adversaries are targeting organizations to access confidential information. Adaptive, persistent cybercriminals easily circumvent traditional security methods such as signatures that require previous knowledge of the attack. Organizations need to detect both k
Every day nation-states and other cyber-adversaries are targeting organizations to access confidential information. Adaptive, persistent cybercriminals easily circumvent traditional security methods such as signatures that require previous knowledge of the attack. Organizations need to detect both known and unknown malware and the attackers’ tactics, techniques and procedures to respond on their own – without using expensive consulting services.

Join McAfee and HBGary to learn how your organization can provide continuous response to the latest cyberthreats affecting your business environment. Topics will include how to:

• Proactively and reactively identify compromised computers.
• Conduct incident response – physical memory & disk forensic search and collection
• Obtain actionable threat intelligence to update network security devices like IPS and Firewall
• Automate reverse engineering malware to collect actionable threat intelligence
Recorded Apr 9 2013 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
McAfee and HBGary
Presentation preview: Defending Against Persistent Attackers: The Need for Incident Response 360°
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defending Against Persistent Attackers: The Need for Incident Response 360°
  • Live at: Apr 9 2013 5:00 pm
  • Presented by: McAfee and HBGary
  • From:
Your email has been sent.
or close
You must be logged in to email this