Cloud security best practices for defending against APTs

Presented by

Tyler Moffitt | Senior Threat Research Analyst

About this talk

Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware attacks to trick users into handing over their personal information. Traditional security solutions are unable to keep up with these new threats and provide effective solutions. By using big data analytics and security intelligence, a Security-as-a-Service platform provides real-time protection to millions of end users daily. This will define the next generation of cloud-based threat identification and advanced persistent threat prevention by leveraging collective cloud-hosted intelligence to offer up-to-the-minute protection—both on the web and across all device platforms. Attendees will leave this presentation with: • An overview of the common threats and methods used to perform attacks. • A summary of the impact such threats bring to both users and businesses. • A better understanding of the challenges and benefits of deploying a cloud-based security solution.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (186)
Subscribers (55452)
Carbonite and Webroot, OpenText companies, provide comprehensive cloud-based cyber resilience solutions, such as endpoint protection, DNS protection, end user training, backup, and threat intelligence for businesses, individuals, and MSPs.