How to Manage Security-Compromised Endpoints
Editor in Chief
Tim Wilson has been a journalist, author, and analyst in data networking and security for more than 24 years. As site editor and co-founder of Dark Reading, one of the Web's best-known destinations for security news and information, he is responsible for covering up-to-the-minute developments in IT security, including the latest attacks and vulnerability discoveries as well as emerging technologies for preventing them.
Tim's checkered past includes two stints as an industry analyst as well as a variety of editorial positions with leading industry publications, including Network Computing, InternetWeek, and CommunicationsWeek. He also served as executive editor of DataTrends Publications, launching five industry newsletters and authoring a number of special reports.
John H Sawyer
Senior Security Analyst
John H Sawyer
John H Sawyer is a senior security analyst with InGuardians, where he specializes in network, mobile, and Web application penetration testing. John has developed and taught cybersecurity training for a large university and spoken at events for industry and law enforcement. He has consulted with federal, state, and local law enforcement agencies on malware analysis, hacker attacks, and digital forensics. John is the author of the popular blog "Evil Bytes" at DarkReading.com, and he's a member of the winning team from DEF CON 14's and 15's Capture the Flag competition.
Chief Marketing Officer
Stuart Itkin leads ThreatTrack Security’s global marketing strategy and operations. He has more than 20 years of executive experience creating and executing marketing and product strategies at a variety of technology and software companies. Most recently, Itkin served as an advisor and interim executive to early-growth-stage businesses and as a marketing mentor and advisor at Mach37, a vertical accelerator focused on launching the next generation of information security companies. Previously, Stuart led global marketing at fast-growing startups and large public companies, including CEB, Kronos, Zebra Technologies, Lucid and Symbol Technologies.
Stuart is an active speaker on industry and marketing topics at seminars and conferences worldwide. He earned a B.A., M.A. and ABD from the University of Illinois in research psychology, computer science and mathematics.
Online malware and targeted cyberattacks continue to become more sophisticated. While there are many technologies and practices for detecting such threats, there are few simple answers for remediating systems that have been infected. In this webcast, top experts will discuss steps for remediating infected systems that go beyond simple reimaging of the device.
Attend this webinar, which will:
- Outline the reasons why today’s cyberattacks often are able to circumvent traditional defenses
- Provide insight on current technologies and practices for detecting and analyzing new infections
- Offer an overview of current technologies and best practices for handling infections that evade enterprise defenses
- Discuss ways to remediate infected systems to go beyond simple reimaging
- Offer recommendations on implementing incident response and remediation processes that deal with the aftermath of an infection/compromise
Register for this webinar to gain insight on what steps to take after an infection occurs.