BankInfoSecurity.com

The Evolution of Cyber-Attacks

Tom Kellermann, VP Cyber Security, Trend Micro


The Evolution of Cyber-Attacks

The advanced persistent threat requires an advanced persistent response. This is one of the strategies suggested by Trend Micro's Tom Kellermann in a discussion about the evolution of cyber-attacks.

See Also: Secure E-Banking: Consumer-Friendly Strong Authentication

In this video interview, Kellermann talks about:

  • New variations of man-in-the-browser, "watering hole" and targeted attacks;
  • How to tackle the 'shadow economy' created by these attacks;
  • How to assemble the key ingredients for an advanced persistent response.

Kellermann is responsible for analysis of emerging cybersecurity threats and relevant defensive technologies. He served as a commissioner on The Commission on Cyber Security for the 44th Presidency, is a professor at American University's School of International Service and is a Certified Information Security Manager (CISM). Previously, he was the senior data risk management specialist for the World Bank Treasury Security Team, where he was responsible for internal cyber-intelligence and policy and for advising central banks around the world about their cyber-risk posture and layered security architectures. He co-authored the book "E-safety and Soundness: Securing Finance in a New Age."

Follow Follow Tom Field on Twitter: @SecurityEditor






Security Agenda

RSA Conference Highlights and Insights

This compilation provides an overview of ISMG’s RSA 2014 coverage, from pre-event promotional materials to excerpts of our exclusive interviews.

Download Now
The State of Information Security

In this year's issue of Security Agenda, we explain why 2014 is finally the "The Year of Security."

Download Now





Latest Tweets and Mentions

Security Agenda

RSA Conference Highlights and Insights

This compilation provides an overview of ISMG’s RSA 2014 coverage, from pre-event promotional materials to excerpts of our exclusive interviews.

Download Now
The State of Information Security

In this year's issue of Security Agenda, we explain why 2014 is finally the "The Year of Security."

Download Now

close

Sign In

close

Create a FREE account

Tell us about yourself

(All Fields Required)

Create your user ID and password

Choose your subscription preferences

Select the Industries and Topics, Type of email content you would like to receive, and Region. (Leave all blank to receive none)

Step 1. Industries & Topics

Step 2. Choose Content

Step 3. Choose Region (s)

close
or
You'll have an opportunity to create your account later.
close
close
close