The Coalfire Blog
Welcome to the Coalfire Blog, a resource covering the most important issues in IT security and compliance. You'll also find information on Coalfire's insights into the unique cybersecurity issues that impact the industries we serve, including Cloud Service Providers, Retail, Financial Services, Healthcare, Higher Education, Payments, Government, Restaurants, and Utilities.
The Coalfire blog is written by the company's leadership team and our highly-credentialed security assessment experts. We look forward to your comments, so please join the conversation.
The Coalfire Blog
Botnets: 2011 Rocky Mountain Information Security Conference
May 09, 2011, Bruce DeYoung,
Botnets have become one of the most dangerous cyber threats affecting businesses today. Botnets criminals focus on the same things as most criminals: money and information. That is why these criminals are targeting payroll, human resources departments, C-level executives and senior strategists.
Due to this unprecedented cyber threat, we have conducted significant research into botnet risks, developments, and protective measures. Karl Steinkamp and I have been asked to share our findings at the 2011 Rocky Mountain Information Security Conference on May 13 in Denver.
I have been involved in secure web application development and system administration since 1994. As a Senior IT Security Auditor with Coalfire Systems, I lead the penetration testing team on web application security assessments.
Karl Steinkamp has over seven years experience as an information security consulting professional with knowledge in the following areas: risk assessments, business continuity planning, policy and procedure development, digital forensics, incident response and handling, penetration testing, and network and systems security management.
Karl and I are will be presenting on the following topics: what botnets are and how they pose risks to business; recent development and growth of the Zeus and Spyeye botnet; latest trends in the wild; 0-day prevalence; advancements in antivirus evasion; and how to protect your web applications and end users’ computers.
We hope to see you there!
For more information about the conference, please click here.
<< Go Back
Blog post currently doesn't have any comments.