The front lines for conflict in the digital age now lay at the network gateway. Unfortunately, on today's virtual battlefield, the enemy is constantly advancing. While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world...
With business networks already supporting an array of mobile devices and remote workers - often on a global scale - many IT executives expect their bandwidth demands to only accelerate, surpassing 10 Gbps by 2020.
Download this report for key findings such as:
Despite the growth in cloud-based solutions, most...
Cybercrime is a global and systemic problem that's growing exponentially. High-profile attacks can be committed with less sophistication because of services for hire readily available on criminal forums. This has resulted in making the methodology and attack vectors mainstream. The impact of new types of crime, as...
Robert Villanueva, assistant special agent in charge (retired), and the founder of the United States Secret Service's Cyber Intelligence Section, in this session will the current rise in the U.S. of data breaches, ransomware, business email compromises, phishing and computer network intrusions. The majority of these...
Detective Chief Inspector Jason Tunn with the Metropolitan Police Service in London, who is the department's lead anti-fraud and cybercrime investigator, walks us through a high-profile case involving the arrest, and recent conviction leading to jail time, of two cybercriminals with connections to a Russian crime...
Genesis: The Nation State APT - Dr. Dale Meyerrose (Major General, USAF, Retired)
Today: The Enterprise as a Target - Glen Jones, (Head of Payment System Cyber Intelligence, Visa)
Many elements of the breaches we now see on a daily basis are firmly rooted in mechanisms developed by nation state adversaries. We...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.