GigaOm Webinar: Countering targeted attacks with active defense strategies

Countering targeted attacks with active defense strategies

Firewalls block basic attacks on your network, antivirus scanners filter known offenders, and no enterprise should operate without them. Still, focused attackers and zero-day exploits make short work of entrenched perimeter defenses, and every business should expect to be breached. To cope with these attacks, IT should build an additional layer of active analysis and mitigation.

This Webinar will examine the ways in which IT can become more proactive in threat identification, evaluate a threat’s origin and intent, and respond to that threat in real-time or close to real-time.

Join GigaOM Research and our sponsor Crowdstrike for “Countering targeted attacks with active defense strategies,” a free analyst roundtable webinar on Wednesday, June 12, 2013 at 10:00 a.m. PT.

What Will Be Discussed

  • What are the limits of perimeter defenses?
  • What is the difference between passive and active defense strategies?
  • How can IT identify and mitigate zero-day and targeted attacks?
  • What are the financial implications of implementing active defenses?
  • What level of response to an attack is appropriate?
  • How should businesses share security data with trusted partners, consultants, and the government?
  • How should businesses choose security partners?

Who should attend

  • CSOs and security workers
  • CIOs
  • System Administrators
  • IT decision makers

June 12, 2013
10-11 a.m. PDT


Research Director, GigaOM Research


GigaOM Research Analyst, Cyber Security Industry Analyst, GigaOM Research
Co-Founder and CEO, CrowdStrike



Sign up for your free CTOvision Pro trial today for unique insights, exclusive content and special reporting.

CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.


Recent Research

Request Your Invite to the 20 May 2014 Andreessen Horowitz Fed Forum in DC

Amazon Hopeful that Fire TV will Spread

What The Enterprise IT Professional Needs To Know About Git and GitHub

3D Printing… At Home?

Tech Firms Seeking To Serve Federal Missions: Here is how to follow the money

Creating The New Cyber Warrior: Eight South Carolina Universities Compete

Mobile Gamers: Fun-Seeking but Fickle

Update from DIA CTO, CIO and Chief Engineer on ICITE and Enterprise Apps

Pew Report: Increasing Technology Use among Seniors

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

Intel CEO Brian Krzanich and Cloudera CSO Mike Olson on Intel and Cloudera’s Technology Collaboration

About Bob Gourley

Bob Gourley is the publisher of and and the new analysis focused Analyst One Bob's background is as an all source intelligence analyst and an enterprise CTO. Find him on Twitter at @BobGourley