• Sponsor Resources
  • Related Resources
  • Classrooms
    • Hybrid Cloud Security
    • Integrating SIEM and Incident Response
    • Targeted Attacks
    • Application Security
    • IoT Security
    • Enterprise IAM
    • Endpoint Security Controls
    • Next Gen Firewalls
    • Data Protection
    • Vulnerability Management
    • Cloud Security

Lesson 1:


The next wave of cyberthreats will combine two trends in new ways, says SANS' Johannes B. Ullrich, head of the Internet Storm Center. In this video, he explains the threats and countermeasures for the Internet of things devices and enterprise crypto ransomware.

New Threats:
The IoT & Ransomware

Lesson 2:


The confluence of the Internet of Things and BYOD may turn into a beachhead for attackers.

Defending Against
The Digital Invasion

Lesson 3:


Devices may not connect to enterprise access systems or inventory and patching mechanisms. Take back control with these widely used network protocols.

Network-based Controls:
Securing The IoTs

Emerging Threats: New Techniques and Countermeasures

This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.

TOP

Johannes B. Ullrich
Chief Technology Officer, SANS Technology Institute

Johannes B. Ullrich, Ph.D., GIAC, GCIA and GWEB, is chief technology officer at the SANS Technology Institute and head researcher at its Internet Storm Center. Follow him on twitter @johullrich.

TOP


Sponsor Resources

Forcepoint™ was created to empower organizations to drive their business forward by safely embracing transformative technologies – cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies involved in managing a collection of point security products.

Learn More
  • Privileged Users

  • The Cost of Unintentional Insider Threat

  • A Business Case For Funding Your Insider Threat Program

  • Unlocking Business Success: The Five Pillars of User Risk Mitigation

  • Defeating the Threat Within


TOP

Related Resources

TechTarget networking websites cover routing and switching, network security and management, application performance and delivery, VoIP, unified communications and collaboration, wireless LANs, Software Defined Networking, Wide Area Networks and mobility. SearchNetworking.com


Learn More
  • Information Security Magazine, April 2015 FULL EDITION

  • Malware defense: How to detect and mitigate advanced evasion techniques

  • Social engineering techniques are becoming harder to stop, experts say

  • What enterprises need to know about the Regin malware toolkit



TOP

Follow Us

15.4k
6.6k
2.5k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111