Webcast: Addressing the Open Doors in Your APT Strategy

Wednesday, July 10, 2013

InfosecIsland News

Ffc4103a877b409fd8d6da8f854f617e

A Blueprint for the Perfect Attack: Addressing the Open Doors in Your APT Strategy

July 17, 2013 at 1PM ET

Register Now

When it comes to advanced persistent threats (APTs), bad actors will take advantage of any and every exploit that they can use to steal your data, and look for the weakest link in your security systems. Common, well-known trust exploits like digitally signed malware with stolen private keys, poor key and certificate management, fraudulent certificates, and weak outdated cryptographic methods are all still in place in many organizations.

Join SecurityWeek and Venafi for this live, interactive Webcast to:

  • Gain insight into the current trust exploits and how recent research places Global 2000 organizations at nearly $400 million in exposure over two years
  • Find out some of the top threats and concerns that global 2000 organizations are facing today, and understand where you fit in on the industry scorecard for trust exploits
  • Learn what steps you need to take in order to gain control over trust and ensure proper enterprise-wide key and certificate management

With APTs leveraging these weaknesses, it’s critical to have visibility and control of enterprise key and certificate inventories. Cyber criminals understand that the easy targets are those organizations that have little visibility into their threat surface and cannot respond quickly. We need to gain control over trust; we need to plug the gap related to key & certificate-based exploits.

Register Now

Possibly Related Articles:
9474
Firewalls Enterprise Security Policy Breaches
Information Security Software
certificate key management
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.