Countermeasures for malicious email code
Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are today's product sets. In this lesson, attendees will get an overview of the email threat landscape, tips for malware protection success and guidance on the future of email attacks.
Sponsored by MessageLabs: Gartner's Magic Quadrant for E-mail Security Boundary, 2006 |

Webcast: Top tactics to beat ever-changing email threats
Length: 50 minutes
In this webcast, Bowers offers insight on the latest messaging-borne threats and investigates the movement from pure antivirus suites to more complete antimalware offerings. His historical look at threats transitions into what's happenign today and what will happen tomorrow, enabling security pros can adjust their email security postures accordingly.
Technical tip: Strategic considerations for an integrated malware defense
Set a strong defensive posture with a look at how best to safeguard your email systems from today's malware. This technical tip provides an understanding of optical mechanisms required for defense-in-depth, whether border technologies mitigate today's attack vectors, the pros and cons of desktop/client protection and how to optimize them, plus fixes for common deployment and administrative challenges faced when implementing these technologies.
Podcast: Fact or fiction: The future of email attacks
Length: 10 minutes
What will the future hold regarding future email attacks? Will a large portion of future attacks actually be caused by governments and political groups? Should enterprises evaluate the effectiveness before or after deployment? We'll confirm or debunk a number of common beliefs about what's coming next.
Quiz: Countermeasures for malicious email code
Take this quiz to test your comprehension of the latest messaging-borne threats and how to combat them.
About the instructor:
@28135 Tom Bowers, who holds the CISSP, PMP and Certified Ethical Hacker certifications, is a well-known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. He is also the president of the Philadelphia chapter of Infragard, the second largest chapter in the country with more than 600 members. Additionally, Bowers leads the independent think tank and industry analyst group Net4NZIX. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale. Bowers is a technical editor of Information Security magazine and a regular speaker at events like Information Security Decisions.