Since the Mandiant APT1 report revealed the identities of Chinese hackers targeting US organizations, attacker attribution has captured attention and dominated the headlines. Attribution is gratifying; wouldn't it feel great to identify and expose the actual adversaries on the other side of the keyboard? In this Webinar, Forrester analyst Rick Holland discusses the benefits and risks of adversary attribution. Rick provides five key considerations when incorporating adversary intelligence into your cybersecurity program.
Agenda:
- Adversary Attribution Captures The Headlines
- Adversary Intelligence Promises Much
- Yet Attribution Isn't Easy And Can Be Dangerous
- Five Steps To Incorporate Adversary Intelligence Into Your Security Program
Key takeaways:
- Know the pitfalls of adversary attribution.
- Learn how to operationalize adversary intelligence.
Vendors mentioned: Booz Allen Hamilton, CrowdStrike, FireEye, iSight Partners, and Verisign iDefense.
You'll receive an email with dialing and Webex instructions prior to the Webinar.