Real World Defense Strategies for Targeted Endpoint Threats
by Lumension on Sep 20, 2013
- 239 views
The security community is amassing a wealth of intelligence about targeted attacks (aka APTs). One thing we are seeing is that the 2 weakest points in our defense against targeted attacks is the human ...
The security community is amassing a wealth of intelligence about targeted attacks (aka APTs). One thing we are seeing is that the 2 weakest points in our defense against targeted attacks is the human element and the endpoint. We need to give more attention to the human element, but few of us are in a position to effect behavioral change in our organization. That is a long road requiring support from management and a more psychology-focused skill set.
On the other hand, most of us are in a position to help improve endpoint security. In this webinar I’ll be focusing on how to build a layered defense against targeted endpoint attacks. To build a true defense-in-depth strategy we will look at the phases of a targeted attack:
*Discover – reconnaissance, “casing the joint”
*Distribute – package and deliver the payload
*Exploit- trigger the payload and exploit the vulnerability
*Control- install persistent malware on system, connect back to command & control
*Execute – spread-out and begin taking action against planned objectives
We will identify controls and technologies that we can deploy to disrupt, hinder, detect and prevent attackers at each phase. These will include:
*Endpoint security best practices
*Endpoint management processes
*Endpoint security technologies
We will draw on the wealth of intelligence the security community is amassing and make this a data-driven presentation.
- Total Views
- Views on SlideShare
- Embed Views