Cyber espionage prevention strategies for your business

Cyber espionage has become a common threat. Join cyber security expert Jeffrey Carr, as he discusses ways to protect your organization from cyber espionage.

Since the beginning of trade, espionage has been as a major information security concern for the enterprise. To add to these woes, the corporate now needs to fight this battle on the cyberspace front as well.  This is why cyber espionage has rapidly emerged as a key security challenge for several enterprises in today’s boundary-less world.

During this podcast, Jeffrey Carr, the Founder and CEO of Taia Global will explain cyber espionage’s exact nature, and how businesses can protect their sensitive data. Carr will also discuss the following cyber espionage aspects: 

• Difference between the concepts of cyber warfare and cyber espionage

• Cyber tactics used to conduct corporate espionage

• Take on China’s cyber espionage activities

• Tips for organizations to protect themselves from cyber espionage attacks

Biography:  Jeffrey Carr is the founder and CEO of Taia Global. Carr is a cyber intelligence expert who specializes in the investigation of cyber attacks against governments and infrastructure by state and non-state blackhat hackers. He has authored a book called ‘Inside Cyber Warfare’, and has spoken about issues related to cyber warfare at various events.

Play now:
Download for later:

Title here

  • Internet Explorer: Right Click > Save Target As
  • Firefox: Right Click > Save Link As

 

This was last published in December 2010

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close