Training

Governance & Risk Management , Next-Generation Technologies & Secure Development

2014 Advanced Persistent Threats Survey Results

2014 Advanced Persistent Threats Survey Results

Today's sophisticated attackers use ever-stealthier malware and zero-day exploits to evade traditional security defenses, making organizations increasingly vulnerable to advanced persistent threats. These APTs seek to exfiltrate critical data over the long term. So, what are the most effective strategies and solutions for APT prevention, detection and defense?

Register for this webinar to get exclusive results and analysis from the 2014 Advanced Threats survey, and learn:

  • The current advanced threat and APT landscape;
  • Where traditional security solutions fall short;
  • Top 2014 APT-related priorities and investments for the coming year.

Background

The survey results are in, and they paint a chilling portrait of organizations and their preparedness for advanced persistent threats.

A full 30 percent of surveyed organizations either have suffered a confirmed APT attack in the past year, or they are uncertain whether they have been attacked - hardly a ringing endorsement for APT detection. More concerning: 53 percent of respondents give themselves a grade of C or lower when asked to self-assess their organizations' ability to defend against APT.

These results beg several probing questions. Among them:

  • Where are organizations most vulnerable to APT?
  • What are the biggest inhibitors to APT detection and defense?
  • What will be the top APT-related investments in the year ahead?

These questions and more will be answered in the 2014 Advanced Persistent Threats Survey Results webinar, which is the exclusive source of survey news and analysis. Learn not just what the survey results say, but how you can put these insights to work in your organization to improve APT prevention, detection and defense.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.