Register Now

     First Name:
     Last Name:
     Dept/BOX/ MS:
     Zip/Postal Code:
     Phone: - -
     Fax: - -
     Company URL:

Register Now
Featured Speakers:
  • Phil Lerner,  Vice President, Technology, StoneSoft

    Stonesoft Privacy Policy

    Bookmark and Share


    A Dark Reading Webcast:

    Cyber Attacks: Are You Really Safe?

    Duration: 60 Minutes

    Are you ready for the coming Cyber War? Attacks against financial institutions and other critical commercial institutions are just the beginning. The big question is how are they doing it? These sophisticated cyber attacks are resource-intensive for cyber criminals. So, they are now using advanced evasion techniques (AETs) to protect their investment and stay under the radar. And recent testing has proven that most network security is unable to stop AETs.

    Join us for the informative session to learn the following:

    • What is an AET attack and how does it differ from advanced persistent threat attacks.
    • How AETs work against even the best network security.
    • What you can do now to add protection to your current security
    • See a demonstration of an AET live, bypassing state-of-the-art firewall and IPS technology

    All attendees will receive a link to download a free, ready-made evasion test lab to use in their own environments.

    About Evasion Techniques: An evasion is an attempt to disguise an attack, in order to avoid detection and blocking by network security systems. Evasions can be used in normal requests, as well as in attacks. An attack consists of a delivery mechanism (e.g. a buffer overflow) and a malicious payload (e.g. code that is executed by the victim computer). An attack is considered successful if the delivery mechanism succeeds in gaining access to the victim computer, regardless of whether the security device detects or responds to the attack.


    UBM Tech - 600 Community Drive, Manhasset, New York 11030 - Privacy Statement