The automation and mechanization of cyber threats has made defending against these advanced persistent threats (APTs) increasingly more difficult. APTs differ from anonymous hacks in that they are motivated, coordinated, well organized (often by a nation state), and well-funded. Those battling inside organizations—CSOs and CISOs—know that it’s never about winning or losing, but about maximizing defenses and minimizing losses.
Come listen to chief defenders as they share views on managing and overseeing their organization’s cybersecurity risks, challenges, and achievements. Hear their advice on successful practices and/or techniques, as well as thoughts on the current state of cyber threat intelligence sharing programs.
Auditorium Borderless Cyber USA / New York / 21-22 June 2017 events@oasis-open.orgThe automation and mechanization of cyber threats has made defending against these advanced persistent threats (APTs) increasingly more difficult. APTs differ from anonymous hacks in that they are motivated, coordinated, well organized (often by a nation state), and well-funded. Those battling inside organizations—CSOs and CISOs—know that it’s never about winning or losing, but about maximizing defenses and minimizing losses.
Come listen to chief defenders as they share views on managing and overseeing their organization’s cybersecurity risks, challenges, and achievements. Hear their advice on successful practices and/or techniques, as well as thoughts on the current state of cyber threat intelligence sharing programs.