Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Detica Executive Gives Presentation on APT

BAE Systems Applied Intelligence : 15 June, 2012  (Technical Article)
The Information Age Enterprise Security conference will this year host BAE Systems Detica Technical Director as a speaker on the effects of Advanced Persistent Threats on businesses
Detica Executive Gives Presentation on APT
Henry Harrison, Technical Director at BAE Systems Detica is speaking at the Information Age Enterprise Security 2012 conference.  Harrison will give a talk titled ‘Advanced persistent threats. How the unseen APT affects business today’, where he will speak about a number of issues, including the changing nature of corporate espionage and how businesses can defend against advanced persistent threats.

Speaking ahead of the Information Age Enterprise Security 2012 conference today, Henry Harrison, Technical Director at Detica said:

“APTs have existed for generations, and businesses and nation states have long grappled with the threat of espionage. The main difference between the corporate espionage of today and yesteryear is the scale of the problem. Technological developments have facilitated corporate espionage on an industrial scale and the internet in particular has created a low cost, low-risk platform for this activity. The anonymity of the internet also lowers the risk of being caught, further exacerbating the threat.”

Harrison offers 3 fundamental steps to businesses as to how they can best protect themselves from APTs.

* Look for the threats. If business are not looking for threats, and don’t know what threats look like, they won’t know when they are being victims of espionage.
* Develop a roadmap. Businesses must develop a roadmap to protect their ‘crown jewel’ information and system in a more effective way than is possible using conventional commercial IT.
* Agree on the level of the risk. Defending against APTs will require additional budget, and business will need to build a business case to explain this to investors.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo