Is Your Insider Threat and Targeted Attack Strategy Still Leaving the Door Open?



Today, every government agency is a target for data theft. Both insider threats and targeted attacks use a common strategy: become a trusted user or system, cloak activities, and then patiently exfiltrate data. Research shows 100 percent of all advanced attacks are a result of compromised credentials, and recent Forrester research indicates new threat protection systems are leaving the door open for attackers to use keys and certificates to become trusted users and systems. 


View our on-demand webcast to learn how to strengthen your insider threat and targeted attack strategy. Kevin Bocek, Venafi Head of Threat Research, will discuss research on cybercriminals actively exploiting keys and certificates, how even today’s best Advanced Persistent Threat (APT) strategies still don’t address this problem, and how new research shows the tremendous impact and real danger of failing to take action now.


In addition to learning more about how we’ve given attackers the ideal vulnerability that we have no means to control or respond to, you will also learn:

  • How keys and certificates are poisoned against your organization
  • How the lack of visibility and inability to respond make keys and certificates the ideal APT attack vector
  • Alarming metrics on the cost of failed trust
  • What strategies can help improve the effectiveness of your APT strategy

Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Tue, Sep 10, 2013, 2:00pm - 2:30pm ET


Cost

Complimentary:  $0.00


Website
Click here to visit event website


Event Sponsors

Venafi


Organizer
Venafi Government Team at Carahsoft


Contact Event Organizer



Return to search results