9th annual e-Crime & Cybersecurity Congress, London, March 15th, 2011


The mechanics of vulnerability multiplication: what does research reveal about the reasons for a four fold increase in end point application vulnerabilities, and what questions does an analysis of the top 50 apps raise about current endpoint security strategy?

  • A battle on two fronts: how has a change in the focus of cyber criminal activity challenged the effectiveness of the defense tools in the standard technical IT security arsenal, as well as striking at an area that is difficult to defend?
  • Time to forget signature detection? A deep dive into the key components of the malware development cycle and insights into how specialised tools are being combined by cyber criminals to automate attack stages
  • Aligning protective measures with the nature of the threat: guidelines for adapting IT and security strategy to reduce endpoint risk