Video

The Evolution of Cyber-Attacks

Tom Kellermann, VP Cyber Security, Trend Micro
The Evolution of Cyber-Attacks

The advanced persistent threat requires an advanced persistent response. This is one of the strategies suggested by Trend Micro's Tom Kellermann in a discussion about the evolution of cyber-attacks.

See Also: Using DPM and MITRE ATT&CK to Improve SOC Effectiveness

In this video interview, Kellermann talks about:

  • New variations of man-in-the-browser, "watering hole" and targeted attacks;
  • How to tackle the 'shadow economy' created by these attacks;
  • How to assemble the key ingredients for an advanced persistent response.

Kellermann is responsible for analysis of emerging cybersecurity threats and relevant defensive technologies. He served as a commissioner on The Commission on Cyber Security for the 44th Presidency, is a professor at American University's School of International Service and is a Certified Information Security Manager (CISM). Previously, he was the senior data risk management specialist for the World Bank Treasury Security Team, where he was responsible for internal cyber-intelligence and policy and for advising central banks around the world about their cyber-risk posture and layered security architectures. He co-authored the book "E-safety and Soundness: Securing Finance in a New Age."

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.