CoreTrace and Amor Group to Host Webinar on IT Readiness to Combat Blended Attacks
Night Dragon: How to Slay the Beast (and the Others Like It)
AUSTIN, Texas, April 13, 2011 /PRNewswire/ -- CoreTrace®, the leading provider of enterprise-ready cross-platform application whitelisting solutions, announced today that it will host a live webinar on Tuesday, April 19 at 2:00 p.m. EDT/11:00 a.m. PDT.
What: Earlier this year, McAfee named and outlined a blended threat that had been quietly attacking critical infrastructure for years: "Night Dragon".
Like Stuxnet, Night Dragon is a fascinating, multi-pronged attack, with all sorts of international intrigue. Also like Stuxnet, IT and security teams should use Night Dragon as a test case for their own readiness--whether they are protecting critical infrastructures or confidential users/data.
Please join Joel Langill, president of SCADAhacker.com , for an interactive webinar and discussion that will help kick-start readiness efforts by:
- Dissecting Night Dragon into its multitude of attack techniques
- Outlining possible approaches/solutions for each component of the attack
- Explaining why application whitelisting is a powerful component of the defense
Richard will be joined by Dan Teal, founder and CTO of CoreTrace and a former Air Force Information Warfare officer, and Andrew Wadsworth, technical director for process security at Amor Group.
When:
Tuesday, April 19, 2011
2 p.m. EDT / 11 a.m. PDT
Note: A replay of the Webinar will be available following the live event via the same registration URL.
Where:
To register for the free webinar, please visit: http://www.coretrace.com/resources/webinars/Amor_Group_Webinar_Night_Dragon_How_to_Slay_the_Beast.aspx
About CoreTrace
CoreTrace® is the creator of high-security, easy-change application whitelisting. The company's BOUNCER solution has received accolades from customers, analysts, and leading publications such as InfoWorld, Network World, and PC Magazine for a simple reason: BOUNCER is the only solution that simultaneously stops all bad applications while allowing users to easily add good ones via its patent-pending Trusted Change capability. The result is improved security and more productive users at a lower total cost of ownership. For more information about CoreTrace, visit www.CoreTrace.com.
Additional Resources:
SOURCE CoreTrace
Share this article