ISTR 22: Extraordinary Attacks, High-Dollar Heists, Electoral Disruption (Briefing)
Tuesday, July 25, 2017 | 9:00 am – 11:00 am | Austin, TX
Each year Symantec releases the Internet Security Threat Report (ISTR) which provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Please join us for this free Breakfast n' Learn to find out more about how cyber attackers revealed new levels of ambition in 2016, a year marked by extraordinary attacks, including multi-million dollar virtual bank heists, overt attempts to disrupt the US electoral process by state-sponsored groups, and some of the biggest distributed denial of service (DDoS) attacks on record powered by a botnet of Internet of Things (IoT) devices. While cyber-attacks managed to cause unprecedented levels of disruption, attackers frequently used very simple tools and tactics to make a big impact. Zero-day vulnerabilities and sophisticated malware now tend to be used sparingly and attackers are increasingly attempting to hide in plain sight. They rely on straightforward approaches, such as spear-phishing emails and "living off the land" by using whatever tools are on hand, such as legitimate network administration software and operating system features.
Date and Time
Tuesday, July 25, 2017 9:00am – 11:00am
(8:30-9:00 check-in / networking)
Location & Contacts
Extellent Professional Development Centers
9420 Research Blvd, Echelon III, Suite 200, Austin, TX 79759
512-346-8110 | robert.cadenhead@Extellent.com
ISTR Breakfast n' Learn
Seating is limited, so please contact Extellent and advise you need to cancel.
Scott Parker, CISSP, CISM, SCS
Sr Principal Systems Engineer, Symantec Corporation
ISSA Distinguished Fellow
Scott is an Information Systems Security Association Distinguished Fellow (reserved for the top 1% members) and has 30 years of strategic and tactical information security experience across multiple control points – data centers, endpoints, and gateways with a focus on threat protection, information protection, cyber security services and security analytics.