Last Updated: 05/18/2012*
Title: Prevent Information Leaks and Detect Malware that Escapes Anti-virus Solutions
Date: Thursday, June 14, 2012
Time: 2:00 p.m. (EDT) Duration: 60 mins
On this webinar you will learn to:
- Mitigate: insider threat risks
- Comply: with congressional insider threat policies that affect your organization
- Protect: against malware that escapes traditional signature-based anti-virus solution
Presenter: Morgan Greenwood, Raytheon Oakley Systems senior cyber strategist
Federal Computer Week and Raytheon recently sponsored the webinar The Emerging Policy Landscape & Best Practices. (Listen here.) Morgan Greenwood, a Raytheon senior cyber strategist, follows up with a best-of-breed solution to help your organization comply with government mandates and policies that were discussed in the prior webinar. Mr Greenwood will discuss Raytheon SureView, a continuous endpoint monitoring solution that enables safe and effective use of mission-critical technologies by capturing human behaviors that serve as warning signs leading up to a breach.
Mr Greenwood will then discuss how traditional anti-virus solutions can only prevent viruses that have already been detected. This type of reactive, anti-virus protection is not sufficient for organizations responsible for providing national security. With this in mind, Raytheon developed a solution known as AMP (Anti Malware Protection) leveraging SureView to identify malware behaviors rather than instances of known malware. This method provides inherent advantages over traditional, signature-based methods, which allows SureView to detect malware before signatures, definitions, and other indicators have been provided.
Morgan Greenwood, a Raytheon senior cyber strategist, has dedicated over a decade to ensuring insider threat solution best practices regarding software, systems, policies, strategies and people. Most recently he has been applying his expertise in malware reverse engineering and analysis integrated into SureView to identify malware based on behavior instead of traditional malware signatures.
* The content on this page is classified as historical content. See this important information regarding such content.