Description: Despite substantial investments in traditional security technologies, the vast majority of advanced attacks go undetected and proliferate undefended. Determined attackers pick their targets for a reason and architect their attacks to easily bypass traditional security technology and defense models.
In this presentation Mr. DeWalt will share FireEye’s latest observations from front lines of the cyber battlefield on how threat actors are exploiting the security gap. Specific topics will include:
•Who is the adversary and what are they after?
•How do attackers circumvent traditional security technologies?
•What are the latest tools, techniques and procedures attackers are using?
•What are the best sources of threat intelligence?
•What can security teams do to better defend themselves?
For More Information Please Visit : - http://shakacon.org/
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.