Achieve Cyber Deterrence: Get to the Root of Cyber Crime with Attack Attribution



The majority of the focus in today's realm of cybersecurity is on the attack: where is the attack coming from, what is being attacked, what type of attack is it, and how can we learn from the attack to prevent it from happening in the future? These are all critical questions, but visionary cyber defenders are expanding their focus beyond the attack and asking who is behind it.

Think about it - attacks don't just happen and malicious code doesn't write itself; it's created by people. These degenerates live in the physical world, many of them are lawbreakers or known "bad actors" who have affiliations, travel histories, records, and other data. They write on blogs and have Facebook pages. Some of the worst offenders are hidden by multiple degrees of separation from the actual coders that do their bidding, so unless you can attribute the attack to an actual attacker in both the physical and digital world, we will never have true cyber deterrence. 

Join us for an informative webinar where we will discuss IBM's next-generation cyber attribution capabilities that allow federal cyber defenders to:

  • Visualize, correlate, and analyze physical and digital cyber data
  • Identify threat actors, who they work for, and the extensive and far-reaching support networks that enable their nefarious activities
  • Increase accountability in this otherwise anonymous, electronic world and achieve true cyber deterrence

If you are unable to attend, click here if you would like to receive the archived recording.

 

 

Bailey Hamilton
IBM Government at 
ESVA Inc.
703-673-9028 (Direct)
877-378-2462 (Toll-Free)
[email protected] 
www.esvainc.com/ibm

 

Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, Jun 17, 2015, 11:00am - 12:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
IBM Government at ESVA Inc.


Contact Event Organizer



Return to search results