CounterTack, a pioneer in embedding real-time threat detection into endpoint operating systems for unprecedented visibility around targeted attacks, will present a webinar "Using Hackers' Own Methods and Tools to Defeat Persistent Adversaries".
Tuesday, November 19, 2013
2:00 - 3:00 p.m. EST
Today, traditional defense methodologies do little to prevent and defend against persistent attacks. To best defend against emerging threats organizations need to think -- and act -- like the attackers.
In this webinar, CounterTack will address the fundamental shift in thinking and approach required to be successful, specifically four critical steps -- Detect, Remediate, Analyze and Resist. It will instruct attendees how to:
- Use attacker technology and tools against attackers to detect their presence on all endpoints.
- Incorporate the same stealth techniques attackers use to hide to monitor them.
- Leverage forensics at the point of attack to better understand the overall threat.
- Use analytics to understand attacker behavior and to draw conclusions about the areas of your systems that require attention.
Michael Davis, CTO at CounterTack