Recently, we’ve seen the emergence of multi-stage attacks, such as the widely reported Target breach. Multi-stage attacks employ multiple technologies, deployed in multiple stages, to penetrate an organization’s defences. For example, a phishing email can result in a malware download which, in turn, can collect and transfer credit card data to an external server.
In this session, respected industry analyst Michael Osterman will examine the anatomy of a multi-stage attack and describe how an organization can employ a defence- in-depth strategy to block the attempt to compromise your security at each stage.
This session is a must-see for any IT or security professional concerned with protecting an organization against the type of sophisticated, multi-stage attack which resulted in the breach of more than 40 million credit card numbers.