Training

DDoS Protection , Governance & Risk Management , Security Operations

2014 Targeted Attacks Study - The Results

2014 Targeted Attacks Study - The Results

How prepared are organizations to detect advanced threats and respond effectively to targeted attacks - before irreparable damage is done?

Register for this session to get the eye-opening results of the 2014 Targeted Attacks Study, as well as:

  • Analysis of where organizations are strongest and weakest in responding to advanced threats;
  • Insight into where organizations are investing their security resources in 2014;
  • Examples of leading-edge security solutions that can help defend against today's sophisticated attacks.

Background

The results of the 2014 Targeted Attacks Study are in, and they offer the proverbial good news/bad news.

The good news is: Most organizations are doing the right things when it comes to preparing to defend against advanced threats. The majority of them have an internal CSIRT, and they have invested in traditional security solutions such as antivirus, intrusion prevention and encryption.

The bad news: Too many of their employees are not doing the right things, and as a result they are leaving their organizations open to the ravages of targeted attacks such as spear phishing, malvertising and Trojans - threats that succeed only when people enable them to succeed.

And then there is the encouraging news, which is that nearly 80 percent of survey respondents expect to receive the same or more budget to defend against advanced threats in the year ahead. And they have plans to invest in advanced security solutions.

Join this webinar to learn more about the survey results and what they mean, including:

  • The extent of damage caused by targeted attacks;
  • Where organizations are most and least prepared to mitigate advanced threats;
  • Top technology investments planned for 2014.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.