Advanced persistent threats (APTs): Dispelling the myths

msisacTo help you better understand and mitigate the risk from APTs, we’d like to invite you to listen to the Advanced Persistent Threat webcast presented by the Multi-State Information Sharing and Analysis Center (MS-ISAC) and featuring Chet Wisniewski, Sophos Senior Security Advisor.

Advanced persistent threat (APT) is a popular buzz phrase in the IT security world these days, but it’s often misunderstood. According to a recent report by the Ponemon Institute, 33% of IT professionals surveyed are unsure how to define the term.

Essentially, APTs are sneaky and hard-to-detect malware that stay on your network, often aimed at stealing financial account information.

In this hour-long webcast, Chet was joined by Rick Doten, Chief Information Security Officer at DMI Mobile Enterprise Solutions. These two experts explain what APTs are, what they aren’t, and how they affect you, no matter what your industry. They also provide tips on how to identify potential APT attacks, and how to remediate and recover from them.

MS-ISAC, a division of the Center for Internet Security dedicated to promoting cyber security among U.S. state, local, tribal and territorial governments, is hosting the webcast as part of its National Webcast Initiative, which provides cyber security education intended for a broad audience.

Webcast: Advanced Persistent Threat: Dispelling the Myths, Uncovering the Reality

A recording of the webcast is now available at the MS-ISAC website.

Learn more about APTs

Get a quick tutorial on APTs in the video below by James Lyne, Sophos Head of Global Security Research. APTs are “all about the behavior of the attacker,” James says. “It’s really about this trait that the attacker is prepared to be patient, and slowly penetrate your network.”

Watch as James uses a backdoor to infiltrate a victim computer and gain administrator access. He explains what kinds of data an APT might target. Finally, James offers some sound advice about securing your network from APTs.

You can watch some of James’s other short, explanatory videos on our Understanding Network Threats page, and on our YouTube channel.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s