Business
How to Spot Invisible Incidents
Author: Dmitry Kuznetsov
Statistics show that attackers require three to five days to obtain full control over large IT infrastructures. While intruders may operate in a hacked network for months, companies usually become acknowledged once hackers' actions lead to significant financial loss.
Standard protection means are of no help. Hiring hackers to prevent hypothetical incidents is unreal. How then to detect intruders in your network?
- Language
- Russian
- Info
- Video
- Presentation
Dmitry Kuznetsov is the Director of Methodology and Standardization at Positive Technologies. He manages scientific researches in product development and certification. He also represents the company in the technical committees of the Federal Agency on Technical Regulating and Metrology — “Information Security” and “Standards for Financial Operations”.
