Main Nav

Wednesday
May 16th, 2012
2:45 PM - 3:45 PM
Meeting Room 103/104
America/Indianapolis
Data breaches and credential/PII theft incidents are becoming more prevalent, and recent red flag rules require heightened data security procedures. Meanwhile, BYOD, social media proliferation, and a growing reliance on cloud and SaaS applications only increase the chance that your users' devices will be compromised. Cybercriminals have created malicious software specifically designed to bypass your existing security controls and network and application protection measures by infecting end-user devices directly. This malware evades standard antivirus and antimalware solutions. We'll describe these cybercrime techniques, review lessons learned from recent incidents, and present possible solutions.
Speakers
Resources