Thursday, February 7, 2013 Virtual Doors Open at 10:30 am ET / 7:30 am PT Get Headphones First 100 Registrants From This Email Get One! Register HERE | https://www.techwebonlineevents.com/ars/eventregistration.do?mode=eventreg&F=1005377&K=1MS1CCNA&cid=email_webc_sec_1ms1ccna&elq=d6c67776b27c4dbdaa206309eac70b97 | Join the Dark Reading and InformationWeek team to look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees will also get a look at how cybercriminals operate, how they are motivated - and what your business can do to stop them. We will discuss: - Profile of a malware author - why do they do what they do?
- The most current methods of building and deploying malware
- How attackers obfuscate and disguise their attacks
- How to detect next-generation attacks
- Methods for tracking attacks back to their sources
- What you can do to discourage malware authors and attackers from targeting your organization
When you register and attend, you will have complimentary access to webcasts, free downloads and research, live chat and networking opportunities and more.
Register today even if you can't attend on February 7, because you'll automatically have access to the on-demand version of the virtual event, and all of the content. |