The Evolution of Cyber-Attacks

Tom Kellermann, VP Cyber Security, Trend Micro
The Evolution of Cyber-Attacks

The advanced persistent threat requires an advanced persistent response. This is one of the strategies suggested by Trend Micro's Tom Kellermann in a discussion about the evolution of cyber-attacks.

See Also: Moving from Vulnerability Management to Effective Vulnerability Response

In this video interview, Kellermann talks about:

  • New variations of man-in-the-browser, "watering hole" and targeted attacks;
  • How to tackle the 'shadow economy' created by these attacks;
  • How to assemble the key ingredients for an advanced persistent response.

Kellermann is responsible for analysis of emerging cybersecurity threats and relevant defensive technologies. He served as a commissioner on The Commission on Cyber Security for the 44th Presidency, is a professor at American University's School of International Service and is a Certified Information Security Manager (CISM). Previously, he was the senior data risk management specialist for the World Bank Treasury Security Team, where he was responsible for internal cyber-intelligence and policy and for advising central banks around the world about their cyber-risk posture and layered security architectures. He co-authored the book "E-safety and Soundness: Securing Finance in a New Age."

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

About the Author

Tom Field

Tom Field

Vice President - Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its diverse cadre of senior-level editors and reporters. He also helped to develop and lead ISMG's award-winning Summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network