The rise of evasive ‘Hunter-killer’ malware that systematically targets and impairs security controls to achieve its objectives -- Save your seat now! To view this email as a web page,
click here | March 19th at 2pm ET / 11am PT | Attendees of this live webcast may be eligible for CPE credit. |
| |
| Picus Security recently analyzed over 600,000 malware samples to identify the ten most common techniques leveraged by attackers. Learn about the key findings of the research, including the rise of evasive ‘Hunter-killer’ malware that systematically targets and impairs security controls to achieve its objectives. Save your seat now to discover: | The ten most widely used MITRE ATT&CK techniques Why and how adversary behaviors are evolving Ways to validate your readiness against sophisticated attacks | | |
| | Can’t attend live? Sign up anyway and we’ll send you a link to the webcast recording when it becomes available. |
| |
| | SC Media webcasts offer programs with leading IT security vendors moderated by SC Media editorial staff. Attendees may be eligible to receive 1 CPE credit for each one-hour webcast they attend, subject to their respective industry association’s approval. Unsubscribe here View Privacy Policy and Terms of Service You are subscribed as: [email protected] © 2024 CyberRisk Alliance | 400 Madison Avenue, Suite 6C New York, NY 10017 |
|
|
..