ISC2 Malware Visitors
If you are an ISC2 member, you likely listened to one of our thought leaders discuss “Malware — The Game Changing Perfect Storm & What to Do About It”
Abstract:
The Data Breach and Hacking Monsoon season has become commonplace in the news & malware has reared its ugly, effective head and continues to fuel the growth of the storm by being in the right place at the right time to be utilized as a tool for personal financial gain & political weaponry. While many believe malware should be a dead issue, many questions are circling in large and small enterprise environments. How do you address these questions?
• Do our executives think malware is still an issue?
• How big of a deal is it?
• Is it measurable?
• Did your ITRM process identify malware as a revitalized threat vector?
• Doesn’t AV solve the issue?
• What can be done to manage residual risk?
Listen to a re-play at: https://www.isc2.org/EventDetails.aspx?id=7402
Referenced Downloads:
- Sample Malware Control Matrix
- Sample Endpoint Protection Selection Matrix (Updated v3)
- NTNU Zero Day Project
- One Class SVM Anomaly Detection Project 1
- One Class SVM Anomaly Detection Project 2