“Night Dragon: How to Slay the Beast (and the Others like It)”
Archived Web Seminar.
In 2011, McAfee named and outlined a blended threat that had been quietly attacking critical infrastructure for years: “Night Dragon”.
Like Stuxnet, Night Dragon is a fascinating, multi-pronged attack, with all sorts of international intrigue. Also like Stuxnet, IT and security teams should use Night Dragon as a test case for their own readiness — whether they are protecting critical infrastructures or confidential users/data.
Please join Joel Langill (@SCADAhacker), President of SCADAhacker.com, for an interactive discussion that will help kick-start readiness efforts by:
- Dissecting Night Dragon into its multitude of attack techniques.
- Outlining possible approaches/solutions for each component of the attack.
- Explaining why application whitelisting is a powerful component of the defense.
Joel was joined by Dan Teal (@DanTeal), founder and CTO of CoreTrace and a former Air Force information warfare officer, and Andrew Wadsworth, Technical Director for Process Security at Amor Group.
If you experience technical problems during registration, please notify us at firstname.lastname@example.org or by calling (512) 592-4100. Please include the document title and internet browser, version, and OS in your message.