Data Protection and Incident Response

When the majority of people think about data protection, they often focus on encryption. Whether the data is at rest, or in transit, the assumption is that cryptographic protocols alone will thwart any attackers attempts to gain access to sensitive data. Whilst there is no doubt that encryption is a core component of an effective data protection strategy, advanced attackers have come up with some creative techniques for circumventing controls. Join FireEye/Mandiant in this webinar to run through some real-world case studies, and discuss data exfiltration techniques.

November 9, 2016

 

Related Webinars

November 17, 2016 4:00pm EST

There’s no such thing as bad publicity? In the era of data breaches, that’s not really true. Time and again…

November 16, 2016 3:00pm EST

Employee accounts are being constantly targeted by black hat teams. Owning the keys to the kingdom leads to large payoffs….

November 16, 2016 9:30am EST

Build an Active Application Defense System Web applications accounted for an astounding 40% of last year’s security breaches. The challenges…