Hi [[ session.user.profile.firstName ]]

Countering Adversaries Part 2: Organized Crime and Brute Force

Hailing from Eastern Europe and North America, organized criminals have a penchant for using brute-force hacking and multiple strands of malware to target financial and retail organizations for monetary gain, according to the Verizon DBIR. It is common for these cybercriminals to directly access dat
Hailing from Eastern Europe and North America, organized criminals have a penchant for using brute-force hacking and multiple strands of malware to target financial and retail organizations for monetary gain, according to the Verizon DBIR. It is common for these cybercriminals to directly access databases and extract payment cards, credentials, and bank account information. Join (ISC)2 and Oracle as we discuss tactics employed by these cybercriminals and how organizations should implement a defense in depth database security strategy to help mitigate the threat.
Recorded Apr 24 2014 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roxana Bradescu, Director of Product Management, Database Security, Oracle & Brandon Dunlap, Brightfly
Presentation preview: Countering Adversaries Part 2: Organized Crime and Brute Force
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Countering Adversaries Part 2: Organized Crime and Brute Force
  • Live at: Apr 24 2014 5:00 pm
  • Presented by: Roxana Bradescu, Director of Product Management, Database Security, Oracle & Brandon Dunlap, Brightfly
  • From:
Your email has been sent.
or close
You must be logged in to email this