More likely than not, your next security incident isn't going to come from a smash and grab hack attack. It's far more likely it'll be in the form of stolen or easily exploited credentials -- and more to the point, it's most likely to be carried out by a cyber espionage unit. In-fact, Verizon's Data Breach Investigation Report (DBIR) estimates that 76% of all breaches in 2012 were from the theft (or weak security status) of legitimate user credentials, with cyber espionage units taking a leading position.

Join G. Mark Hardy, President, National Security Corporation, at this half-day security seminar, to walk away with a comprehensive and realistic understanding how today's most rapidly evolving threat, cyber espionage, directly impacts your current network security efforts and go beyond the stats and data of Mandiant's APT1 and Verizon's DBIR reports to uncover practical defenses you can implement immediately.

And what better way - - if you are "reasonably" sure that your network is secure -- than to attend and sanity check that the strategy and tools you have in place now are good enough to keep you sleeping soundly and guilt-free at night. It's like getting a free security report card that points out exactly what you're doing right and more importantly, where hidden gaps still remain. Including:

  • Who is trying to weasel their way into your network to snatch up your data.
  • How espionage units are getting in and digging deep to hide from your current detection methods.
  • Why you need to make inherent changes in the way you think about network security.
  • And much more!

Why you can't afford to miss this event?

Verizon's latest DBIR also approximates 40% of all network breaches use some sort of malware to successfully embed themselves deep within your network (which just so happen to also be the most used threat action of espionage units), to either steal or crack legitimate credentials. And the challenge is, of course, not figuring out how to necessarily "stop" an attack, but rather how to build a solid security strategy that reduces the risk that cyber espionage units pose, while allowing for effective tracking and detection should (well to be more realistic, when) a breach takes place.

We guarantee that you'll return to the office with the technical tips, expert insight and user-friendly takeaways that can be implemented immediately to achieve such a strategy.

Earn CPE Credit!

As with many of our security events, all attendees are eligible to earn CPE credits in partnership with certification leader, (ISC)2.A post-show email will be sent to attendees with instructions on how to claim your CPE credits.

What have past attendees said about our security events?

"Very informative. Re-energized me on a number of initiatives and provided a number of methodologies that I can put into action immediately."

"Lots of new ideas…very informative; messages in real good detail."

“Great speaker. Good examples.”

“Good practical information and issues to focus on; Excellent delivery”

“Good presentation. Lots of experience and real life examples”

Who should attend?

Information security directors and managers, CSIOs, security auditors and architects, as well as network engineers, administrators, and other security personnel charged with network access, data loss prevention and threat protection.

Registration is FREE for qualified IT professionals

To claim your complimentary seat today, submit your application online or contact Katherine Kiley, at 617-431-9726 or kkiley@techtarget.com.

 

Dates and locations

 

St. Louis, MO

Sheraton St. Louis City Center
Tuesday, October 22, 2013

Register today by calling Jen Tobin at (617) 431-9722 or completing our quick online registration form.

Complimentary admission is granted on a first-come, first-serve basis and attendance is limited to ensure an effective learning experience, abundant peer-networking opportunities and access to our expert presenters. Apply today to ensure your seat is saved in advance!

Agenda

8:00 a.m.

Registration and Refreshments

8:50 a.m.

Introduction and Welcome

9:00 a.m.

Session in detail

Data Security Intelligence Report: How the West Was Pwned
Presented by: G. Mark Hardy

Chances are your network is owned by the bad guys already, and you just don't know it yet. Disagree? Security research data suggests otherwise. We'll look at the threats and attacks we've seen that are designed to elude detections, show how they are identified and discovered, and discuss ways to keep them from coming back.

10:00 a.m.

Solution Spotlight - Wading through the ocean of various vendor solutions and choosing one that fits your specific needs is no easy task. This concise solution spotlight is a perfect opportunity to hear from leading vendors about their latest solutions without the high-pressure sales pitch.

10:30 a.m.

Refreshments Break and IT Showcase

10:45 a.m.

Session in detail

Security Threat Intelligence to Empower You
Presented by: Sadik Al-Abdulla

Today's always-on networks mean you must always be on-guard against viruses, worms, Trojans, botnets and spyware. In this session Sadik Al-Abdulla, director of security solutions at CDW, shows you how you can more successfully detect malware and deliver a one-two punch against attacks.

Sadik will explain how passive malware inspection services more accurately detect existing threats, giving you the knowledge you need to build a case for security and better prioritize your investments.

11:30 a.m.

Panel Discussion - Rounding out the day's sessions, this panel discussion features the day's speakers and is your chance to have your specific security questions answered by two of the industry's leading information security experts.

12:15 p.m.

Raffle, Seminar Adjourns

Speakers

G. Mark Hardy

Bio
President, National Security Corporation

Sadik Al-Abdulla

Bio
Director of Security Solutions, CDW

Partners

 

Media sponsors

Sponsor Logos

Sponsor Logos

Sponsor Logos

Sponsor Logos

Giveaways

Giveaway

Each attendee will be entered to win a Plantronics Voyager PRO Bluetooth Headset!

TechTarget contact

For questions about your registration or the event agenda please contact:

Jen Tobin
Delegate Relations Manager
jtobin@techtarget.com
Tel: 617-431-9722