Dissecting the Top Five Network Attack Methods: A Thief’s Perspective

Dissecting the Top Five Network Attack Methods: A Thief’s Perspective
Start: August 13, 2015
iCal Import

Data breaches and their aftermath are commonplace, with no signs of slowing.

The threats you face today are created by savvy criminals leveraging advanced techniques to surgically target network openings you may not know you have.

And while the situation is serious, with certain smart network changes and a healthy-dose of ‘knowing your enemy,’ the prognosis is quite good.

Join Intel Security experts as they offer forensic insight into recent research that identified five of the most common network attack methods that data thieves love to use. This session will provide practical guidance on how criminals view your network, how to use that information to maintain a dynamic security profile, and ways to minimize the likelihood of a breach and its injurious repercussions.

Nat Smith is responsible for bringing McAfee Network Security Platform and McAfee Advanced Threat Defense to market. Nat works with partners and advanced threat thought leaders to collaborate and contribute to the greater network security market, offering new perspectives with his technical background in security, networking, APM and virtualization.

Prior to joining McAfee, Nat held senior product positions at OPNET Technologies, T-Mobile, and Expand Networks (now Riverbed). Nat holds an MBA with honors from the Marriott School of Management at Brigham Young University.

Steve Grossenbacher is responsible for all aspects of bringing McAfee Network Security Platform to market. Joining McAfee with the Entercept acquisition in 2003, Steve has held multiple positions within McAfee from competitive intelligence to technical support.

Prior to joining McAfee, Steve held positions with Xerox Engineering Systems in Backline and Sales Engineering. With nearly 10 years of experience working with McAfee’s IPS and over 15 years in the security industry, Steve’s experience provides him a broad and deep perspective of the network and security industry in general.

Attend

TAGS:
CATEGORY: Events, Webinars
 
 

Popular posts

Related posts