BrightTalk Security Summit
December 3, 2013 - December 3, 2013
Join us to explore the concept of using automated tactical intelligence in the war against advanced malware. Cybersecurity solutions must be able to identify the tactical steps of the kill chain of sophisticated attacks and Advanced Persistent Threats (APTs). By automatically identifying these tactical steps and alerting the operator, the malware can be stopped prior to devastating damage or critical data theft occurring. Explore how these next-gen solutions utilize network topology and knowledge of advanced malware’s tactics to identify hosts that have been compromised. Unlike other tools that only work on a single event or signature, advanced threat detection solutions must be able to analyze and correlate network activities over weeks or months to identify the most sophisticated attacks - and do it automatically, saving valuable forensic analysts time and reducing the likelihood of missing serious bad actors.