Adaptive Application Whitelisting 101 – Preventing Modern Attacks

Presented by

Tom Murphy, Chief Strategy Officer – Bit9

About this talk

The 2011 Verizon Data Breach Investigations Report cites - 94% of data records breached leveraged some form of malware - 60% of all malware is customized, therefore not recognizable by AV Analysts recommends Application Whitelisting as "foundational" to protect endpoints. Application Whitelisting ensures only authorized software can run, eliminating the threat of malware. Success requires a simple, adaptive approach. Follow the three R’s for Adaptive Application Whitelisting: - Real-time Change Detection – to detect configuration changes - Rules Engine – To automatically trust software - Reputation Service – to assign trustworthiness to all software Learn how Fortune 2000 companies are preventing today’s modern attacks.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (1747)
Subscribers (47814)
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.