Why Hackers Attack: Understanding Threats and Motivations for Online Intrusion

To develop a strong defense, you must have a good understanding of who is likely to attack your organization – and why.

In this Dark Reading webinar, a top expert discusses the different types of attackers that may test your defenses, and the different methods that each category of attacker might use to penetrate your systems. You’ll also get advice and recommendations on how to use your knowledge of attackers to build a more effective, customized defense that increases the security of your critical data.

On Demand
1h 00min

Attend and you'll Learn:

  • which attackers target what types of organizations, people and industries
  • which attackers target what types of data and systems
  • how different attackers exploit or destroy systems
  • what questions you must ask your line-of-business managers in order to fully understand your organization, data, and the attackers who might target them

Don't miss your chance to come away with a plan for building a more customized risk-based defense for the real threats to your organization, register today.

Featured Speakers

  • Chris Novak
    Chris Novak
    Co-founder and Global Director
    Verizon Threat Research Advisory Center

    Christopher Novak is a co-founder and the Global Director of the Verizon Threat Research Advisory Center. He is an internationally recognized expert in the field of Incident Response and Computer Forensics. He has been involved with information security for over 15 years. Christopher has assisted corporations, government agencies, and attorneys with all matters involving computer forensics, fraud investigations, and crisis management. He has testified as an expert witness in various matters and before such bodies as the Supreme Court of the State of New York. He has also briefed United States congressional committees such as Senate Banking, House Financial Services, Senate Commerce, House Energy & Commerce, Senate Judiciary, House Homeland Security and Senate Homeland Security & Government Affairs.

    He has been an advisor on dozens of high-profile intrusion and data breach investigations around the globe. He works closely with local, state and federal law enforcement agencies as well as joint investigative operations coordinated with foreign law enforcement.

    In his current position, he manages teams of highly skilled consultants located around the world. Each of these teams maintains experts in various fields of study and practice, such as forensic analysis, malware reverse engineering, threat intelligence and threat actor attribution, among others… Christopher specializes in high-level crisis and emergency response matters and is regularly consulting with executives from Fortune 500 companies with regard to pre-planning for such situations as well as leading active crisis response matters and liaising with external partners.

    Christopher is an active public speaker, discussing various topics ranging from high-level best practices to executive-level crisis management. He has been a contributing author of the Verizon Data Breach Investigations Report since its first publication in 2008 and has been featured in such media outlets as The Wall Street Journal, ABC News, American Banker, and many others. Christopher is an active member among multiple industry trade groups and a frequent guest lecturer at universities. He also serves as an advisor for many industry-related associations in an effort to further promote cybersecurity awareness and education as well as working closely with organizations as it relates to various policy initiatives on the topic of cybersecurity.

    Christopher holds a Bachelor of Science Degree in Computer Engineering from Rensselaer Polytechnic Institute.

  • Teddy Powers
    Teddy Powers
    Security Engineer

    Teddy Powers has been an SE with Anomali for almost 3 years, supporting customers in the financial, healthcare, telecom and tech sectors. Unlike most of his team members, his previous position before Anomali was not at ArcSight but at the Villanova University Athletic Department. In his free time, he reads, plays guitar, sings and hits more golf balls than any healthy, sane person should.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By