Training

Fraud Management & Cybercrime , Governance & Risk Management , Incident & Breach Response

Combating the Malware Lifecycle

Combating the Malware Lifecycle
IBM's Etay Maor

LIVE Webinar: Led by IBM's Senior Cyber Security Strategist, Etay Maor

Today everything is for Sale - anyone (amateur or professional hacker) can access or purchase a wide range of tools enabling them to leverage the latest application vulnerabilities to target their victims.

Background

When discussing malware, we tend to focus on the technical aspects of how a specific malicious program operates on an infected system - and the processes executed by a malware variant. These could range from how it latches onto an infected device to how it manipulates the user into providing personal credentials, but truly this is just a small subset of the cybercrime ecosystem.

As little as 8 to 10 years ago, a single hacker would be responsible for everything from coding the malware to distributing it - including setting up command-and-control (C&C) servers, identifying infection points, working with money mules and more. Today, the whole process, or at least each individual element, can be easily outsourced. Everything is for Sale!

Register today for this complimentary webcast where you will learn about the strategies and tactics to counter the malware lifecycle and cybercrime underground.

By registering for this webinar, you agree to IBM's Privacy Policy

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.