The headlines are full of stories of breach, and information security professionals are beginning to accept that security breaches are a ‘when?’, not an ‘if’.
According to Verizon’s 2013 Data Breach Report, 50 percent of major companies have experienced malware attacks and, surprisingly, 17 percent of these companies didn’t even know they had been breached until it was too late. Most industry experts have declared perimeter defenses ineffective and are advocating that vendors build systems on the assumption that adversaries will get in.
- Consider the unique challenges of dealing with an Advanced Persistent Threat
- Offer advice on five things to do after an attack
- Look at the necessity of security automation and consider how to overcome typical automation roadblocks
- Discuss how to implement automated malware removal and incident response