GigaOm Webinar: Countering targeted attacks with active defense strategies

Countering targeted attacks with active defense strategies

Firewalls block basic attacks on your network, antivirus scanners filter known offenders, and no enterprise should operate without them. Still, focused attackers and zero-day exploits make short work of entrenched perimeter defenses, and every business should expect to be breached. To cope with these attacks, IT should build an additional layer of active analysis and mitigation.

This Webinar will examine the ways in which IT can become more proactive in threat identification, evaluate a threat’s origin and intent, and respond to that threat in real-time or close to real-time.

Join GigaOM Research and our sponsor Crowdstrike for “Countering targeted attacks with active defense strategies,” a free analyst roundtable webinar on Wednesday, June 12, 2013 at 10:00 a.m. PT.

What Will Be Discussed

  • What are the limits of perimeter defenses?
  • What is the difference between passive and active defense strategies?
  • How can IT identify and mitigate zero-day and targeted attacks?
  • What are the financial implications of implementing active defenses?
  • What level of response to an attack is appropriate?
  • How should businesses share security data with trusted partners, consultants, and the government?
  • How should businesses choose security partners?

Who should attend

  • CSOs and security workers
  • CIOs
  • System Administrators
  • IT decision makers

June 12, 2013
10-11 a.m. PDT


Research Director, GigaOM Research


GigaOM Research Analyst, Cyber Security Industry Analyst, GigaOM Research
Co-Founder and CEO, CrowdStrike



CTOvision Pro Special Technology Assessments

We produce special technology reviews continuously updated for CTOvision Pro members. Categories we cover include:

  • Analytical Tools - With a special focus on technologies that can make dramatic positive improvements for enterprise analysts.
  • Big Data - We cover the technologies that help organizations deal with massive quantities of data.
  • Cloud Computing - We curate information on the technologies enabling enterprise use of the cloud.
  • Communications - Advances in communications are revolutionizing how data gets moved.
  • GreenIT - A great and virtuous reason to modernize!
  • Infrastructure  - Modernizing Infrastructure can have dramatic benefits on functionality while reducing operating costs.
  • Mobile - This revolution is empowering the workforce in ways few of us ever dreamed of.
  • Security  -  There are real needs for enhancements to security systems.
  • Visualization  - Connecting computers with humans.
  • Hot Technologies - Firms we believe warrant special attention.


Recent Research

Finding The Elusive Data Scientist In The Federal Space

DoD Public And Private Cloud Mandates: And insights from a deployed communications professional on why it matters

Intel CEO Brian Krzanich and Cloudera CSO Mike Olson on Intel and Cloudera’s Technology Collaboration

Watch For More Product Feature Enhancements for Actifio Following $100M Funding Round

Navy Information Dominance Corps: IT still searching for the right governance model

DISA Provides A milCloud Overview: Looks like progress, but watch for two big risks

Innovators, Integrators and Tech Vendors: Here is what the government hopes they will buy from you in 2015

Navy continues to invest in innovation: Review their S&T efforts here

MSPA Unified Certification Standard For Cloud Service Providers: Is This A Commercial Version of FedRamp?

Watch Ben Fry And His Visualizations: Multiple use-cases come to mind, including national security efforts

Agenda And More Details for 4-5 March NIST Data Science Symposium

Actionable Insights From AFCEA Western Conference and Exposition 2014

About Bob Gourley

Bob Gourley is the publisher of and and the new analysis focused Analyst One Bob's background is as an all source intelligence analyst and an enterprise CTO. Find him on Twitter at @BobGourley