Back to the main page
Know Your Enemy: Profile Attackers and Defend Targeted Assets
In The Art of War, Sun Tzu writes, "Know your enemies and know yourself." In the world of enterprise security, that means knowing who wants to access your sensitive data—and understanding whether or not your security systems are providing a sufficient defense against these threats.
In the new Countering Adversaries webcast series now available on demand, security experts explain how to identify the kinds of adversaries specific industries attract, understand the types of data they are after, and focus in on the tools that provide the most effective deterrence against these specific threats.
The webcast series, created in cooperation with security consortium (ISC)2, builds on conclusions from the 2014 Verizon Data Breach Investigations Report, which identifies three distinct threat actors: hacktivists, organized crime, and espionage.
The webcast three-part series includes:
- Espionage and Stolen Credentials
Espionage-related attacks are very targeted. Such attackers know exactly what they are after and work methodically to get it—often spending years gathering data. These types of attacks, known as advanced persistent attacks—or APTs—are especially effective. Learn how to detect and prevent this kind of attack.
- Organized Crime and Brute Force
Organized criminals tend to use brute-force hacking and multiple strands of malicious software code to target financial and retail organizations for monetary gain, according to the Verizon report. They often try to gain direct access to databases and extract payment card details, credentials, and bank account information. This webcast examines ways organizations can implement a defense-in depth database security strategy to prevent such attacks.
- SQL Injection Attacks
Usually, hacktivists break into organizational web applications and databases to find personal and organizational data in order to expose this private information. Their tool of choice: SQL injection attacks, which can be both simple to perform and difficult to detect. This webcast explores ways to block SQL injection attacks and protect highly sensitive customer and organizational data.
Watch the on-demand Countering Adversaries webcast series to learn key threat vectors that target your industry, and how best to mitigate them. Bookmark the Oracle Database security resources site today to stay up to date on the latest security information from Oracle.