Cybercrime Threats: How Criminals Bypass Security Measures to Steal Your Sensitive Data and Money and Ruin Your Reputation

Wednesday, May 16 | 3:45PM–4:45PM | Meeting Room 103/104
Session Type: Professional Development
Data breaches and credential/PII theft incidents are becoming more prevalent, and recent red flag rules require heightened data security procedures. Meanwhile, BYOD, social media proliferation, and a growing reliance on cloud and SaaS applications only increase the chance that your users' devices will be compromised. Cybercriminals have created malicious software specifically designed to bypass your existing security controls and network and application protection measures by infecting end-user devices directly. This malware evades standard antivirus and antimalware solutions. We'll describe these cybercrime techniques, review lessons learned from recent incidents, and present possible solutions.