LIVE Webinar: Led by IBM's Senior Cyber Security Strategist, Etay Maor
Today everything is for Sale - anyone (amateur or professional hacker) can access or purchase a wide range of tools enabling them to leverage the latest application vulnerabilities to target their victims.
When discussing malware, we tend to focus on the technical aspects of how a specific malicious program operates on an infected system - and the processes executed by a malware variant. These could range from how it latches onto an infected device to how it manipulates the user into providing personal credentials, but truly this is just a small subset of the cybercrime ecosystem.
As little as 8 to 10 years ago, a single hacker would be responsible for everything from coding the malware to distributing it - including setting up command-and-control (C&C) servers, identifying infection points, working with money mules and more. Today, the whole process, or at least each individual element, can be easily outsourced. Everything is for Sale!
Register today for this complimentary webcast where you will learn about the strategies and tactics to counter the malware lifecycle and cybercrime underground.
Maor is Chief Security Officer at IntSights. As CSO, Etay leads the security advisory practice at IntSights where he works with CISOs and other senior cybersecurity executives to develop risk management-based cybersecurity programs. Etay has extensive experience in cybersecurity having worked at IBM, Trusteer, and RSA. Etay holds a BA in Computer Science and a MA in Counter Terrorism and Cyber Terrorism and is currently a professor at Boston College.