Research Output
Vulnerability analysis.
  The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the biggest names to fall victim in the last 12 months. The result is that massive amounts of personal data have been stolen in recent years and are now available to cybercriminals. This causes distress to consumers facing fraudulent charges and compromised cards, and enormous financial and reputational damage to the organisations that are hacked. To secure the future IT professionals need to be as sophisticated as the attacks they face and focus on prevention, detection and mitigation.

  • Type:

    Lecture

  • Date:

    14 May 2015

  • Publication Status:

    Unpublished

  • Library of Congress:

    QA76 Computer software

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2015, May). Vulnerability analysis. Presented at Advanced Threat Protection, Glazier's Hall, London

Authors

Keywords

Cybersecurity; fraud; hacking; risk management;

Monthly Views:

Available Documents