Understand the most prevalent forms of cyber and insider-threat espionage – and how to defend against them.
Nation-state espionage against commercial enterprise is one of the largest problems impacting the world today. Vast amounts of research and development resources power nation-state espionage programs. These programs are designed to target and exploit computer networks and to facilitate the recruitment of organization insiders who can provide access to valuable information.
A panel of security experts, including Bishop Fox AVP of Consulting Daniel Wood, discusses these capabilities as they pertain to Russia, China, Iran, and North Korea. It reviews multiple forms of cyber and insider threat espionage, how it works, how it is used, and who is using it. More importantly, the panel discusses critical controls that organizations can implement to defend against this dangerous threat.
You will learn about:
- The technical capabilities of these nation-states and their approaches to computer network exploitation
- The methods used to recruit company insiders – what does that investment look like on the technical side, how are they managing access, and what should an enterprise security organization be on the lookout for?
- The importance of managing risk associated with third-party exploitation in your supply chain
- The advanced controls that need to be in place to help defend against well-resourced nation-states