Share these talks and lectures with your colleagues
Invite colleaguesCyberattacks survival guide
Abstract
If your organisation experienced a cyberattack tomorrow, how would your defences cope? Would they keep your company‘s applications and data safe from harm, or would they fall victim to the attack? This paper highlights five of the most common threats that businesses experience, including polymorphic malware, man-in-the-middle attacks, cryptominers, DDoS bots and targeted intruders, and describes security techniques that can mitigate the impact of those threats. The paper goes on to describe five real cyberattacks that Check Point‘s Incident Response Team encountered on customers‘ networks and how each was remedied.
The full article is available to subscribers to the journal.
Author's Biography
Gadi Naveh works closely with Check Point‘s Incident Response, Threat Intelligence and Research & Development teams to help customers understand the current threat environment and how they can prevent attacks. With more than 15 years‘ information security experience, he has been involved with cyber security solutions ranging from endpoint to network architecture models and is a frequent speaker at various global security conferences such as BlackHat USA, Infosec Europe, Interop Japan and many local conferences.