Hi [[ session.user.profile.firstName ]]

Countering Adversaries Part 1: Espionage and Stolen Credentials

By profiling criminal activity, the Verizon Data Breach Investigations Report has been able to identify three distinct threat actors including espionage, organized crime, and activists. Organizations can take proactive steps to mitigate potential risks by understanding each threat actor’s methods an
By profiling criminal activity, the Verizon Data Breach Investigations Report has been able to identify three distinct threat actors including espionage, organized crime, and activists. Organizations can take proactive steps to mitigate potential risks by understanding each threat actor’s methods and targets. In this three part series, (ISC)2 and Oracle will examine these three threat actors, the industries they target, and how to protect sensitive customer and organizational data. We begin with countering espionage threats and their preference for using stolen credentials.
Recorded Mar 27 2014
60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roxana Bradescu, Director of Product Management, Database Security, Oracle & Brandon Dunlap, Brightfly
Presentation preview: Countering Adversaries Part 1: Espionage and Stolen Credentials
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Countering Adversaries Part 1: Espionage and Stolen Credentials
  • Live at: Mar 27 2014 5:00 pm
  • Presented by: Roxana Bradescu, Director of Product Management, Database Security, Oracle & Brandon Dunlap, Brightfly
  • From:
Your email has been sent.
or close
You must be logged in to email this