Protecting Critical Infrastructure: Using Application Forensics to Discover the Bad Actors Behind Threats Online webinar: Presented by: Free and open to government, telecoms, private enterprise security executives and ISS vendors. Pre-registration with your government or corporate issued email address is required. |
Protecting Critical Infrastructure: Using Application Forensics to Discover the Bad Actors Behind Threats Governments are struggling to protect their Critical Infrastructure from attacks, which are escalating in both volume and severity worldwide, with 83% of critical infrastructure security admins saying they’ve had at least one operational technology breach in the last three years. Protecting critical resources and prosecuting the perpetrators of such attacks is a key priority of law enforcement, counter-terrorism and intelligence agencies. However most lack the tools to trace attacks back to their source as well as gather the forensic digital evidence needed to identify and prosecute the attackers. This webinar will demonstrate a government-centric approach to protecting national critical infrastructure, critical sectors and government resources using application forensics. Specific topics include:
Presented by: All Contents Copyright © 2022
|