A complimentary, half-day seminar sponsored by CDW and produced by TechTarget Custom Media
More likely than not, your next security incident isn't going to come from a smash and grab hack attack. It's far more likely it'll be in the form of stolen or easily exploited credentials -- and more to the point, it's most likely to be carried out by a cyber espionage unit. In-fact, Verizon's Data Breach Investigation Report (DBIR) estimates that 76% of all breaches in 2012 were from the theft (or weak security status) of legitimate user credentials, with cyber espionage units taking a leading position.
Join G. Mark Hardy, President, National Security Corporation, at this half-day security seminar, to walk away with a comprehensive and realistic understanding how today's most rapidly evolving threat, cyber espionage, directly impacts your current network security efforts and go beyond the stats and data of Mandiant's APT1 and Verizon's DBIR reports to uncover practical defenses you can implement immediately.
And what better way - - if you are "reasonably" sure that your network is secure -- than to attend and sanity check that the strategy and tools you have in place now are good enough to keep you sleeping soundly and guilt-free at night. It's like getting a free security report card that points out exactly what you're doing right and more importantly, where hidden gaps still remain. Including:
- Who is trying to weasel their way into your network to snatch up your data.
- How espionage units are getting in and digging deep to hide from your current detection methods.
- Why you need to make inherent changes in the way you think about network security.
- And much more!
Why you can't afford to miss this event?
Verizon's latest DBIR also approximates 40% of all network breaches use some sort of malware to successfully embed themselves deep within your network (which just so happen to also be the most used threat action of espionage units), to either steal or crack legitimate credentials. And the challenge is, of course, not figuring out how to necessarily "stop" an attack, but rather how to build a solid security strategy that reduces the risk that cyber espionage units pose, while allowing for effective tracking and detection should (well to be more realistic, when) a breach takes place.
We guarantee that you'll return to the office with the technical tips, expert insight and user-friendly takeaways that can be implemented immediately to achieve such a strategy.
Earn CPE Credit!
As with many of our security events, all attendees are eligible to earn CPE credits in partnership with certification leader, (ISC)2.A post-show email will be sent to attendees with instructions on how to claim your CPE credits.
What have past attendees said about our security events?
"Very informative. Re-energized me on a number of initiatives and provided a number of methodologies that I can put into action immediately."
"Lots of new ideas…very informative; messages in real good detail."
“Great speaker. Good examples.”
“Good practical information and issues to focus on; Excellent delivery”
“Good presentation. Lots of experience and real life examples”
Who should attend?
Information security directors and managers, CSIOs, security auditors and architects, as well as network engineers, administrators, and other security personnel charged with network access, data loss prevention and threat protection.
Registration is FREE for qualified IT professionals
To claim your complimentary seat today, submit your application online or contact Katherine Kiley, at 617-431-9726 or email@example.com.