Upcoming webinars: Infosecurity Magazine

We have openings for speakers on these panels.

Speakers can be industry analysts, academics, independent consultants or IT or information security professionals – but not information security vendors.

Please contact me for more information on the sessions if interested. They are all at 1500 London time unless otherwise stated.

Poison Ivy: Sniffing out the RAT 08 10 13

The Poison Ivy remote access tool (RAT) has been used in several high-profile malware campaigns, most famously, the 2011 compromise of RSA SecurID data. In the same year, Poison Ivy powered a coordinated attack dubbed “Nitro” against chemical makers, government offices, defense firms, and human rights groups.

Posion Ivy is so widely used that security professionals are having a harder time tracing attacks that use the RAT to any particular attacker.

Join this webinar to learn exactly how Poison Ivy works, why it remains one of the most widely used RATs and discover free tools that can be used to combat it.

October Patch Update – 10 10 13

Every two months, our Patch webinar gives listeners a chance to stay up to date with the latest security updates and patches, and to look deeper at some of the issues around patch management.

In each webinar, we start with a look at Microsoft’s Patch Tuesday releases and round up the main security updates and patches from other software and operating systems vendors. We then look at the key “out of band” patches, and our expert panel will discuss these and developing issues in the field of security updates and patching.

And, in each session, we will conclude with audience questions: your chance to quiz our experts on the best ways to keep your infrastructure secure.

Plus: for this session: Patch Tuesday is 10 years old this month: what has the industry learned, and what is there still to do?

APT Protection via Data-Centric Security
: 24 10 13 

Traditional perimeter security is failing. The threat from advanced persistent threats shows no sign of easing, every business in its path.

One key ingredient of APTs is obtaining access to privileged user accounts.

This fundamental flaw in distributed systems enables attackers to compromise data. Monitoring and detection are critical, but preventing privileged users and their access from being used against your organisation to compromise data is vital.

Most organisations don’t even know when they have been targeted. The average number of days before detection was over a year: 416 days.

In this webinar, we will look at:

–       how APTs and other intrusions exploit privileged user accounts;

–       how to protect those accounts without hindering IT operations;

–       how to detect APTs and vitally, how to protect the organisation from the consequences of an exploit.


About stephenpritchard
Freelance journalist specialising in business and technology, based in London (UK).

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: