The Evolution of Cybercrime and Fingerprinting Cyber Attackers

Share : Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someone

Stuart Borgman Director of Cyber Security Engineering for Palo Alto Networks will be exploring the evolution of cybercrime, fingerprinting attackers and more at the Cyber Security Briefing on June 15th in The Aviva Stadium.

Register now to attend Magnet’s Cyber Security Briefing for free, book early as places are limited, breakfast included.

Stuart Borgman, Director of Cyber Security Engineering in Palo Alto Networks will be speaking at Cyber Security Briefing.

The Roots of Cybercrime

Cyber attacks began in the 80s and first virus distributed online, Morris, took place in 1988. There were many hacks throughout the 90s and traditionally cybercrime was dominated by nerdy teenage hackers looking for badges of honour in their online community. They were motivated by the reputation “to see if they could”. However it wasn’t until the early 2000s when the internet was widely used that hackers began to use cyber attacks for financial gain in a streamlined way. Many cyber attacks are still carried out by individuals and small groups however those that are making the most noise today are not individuals in silos.

What does a Cybercriminal look like in 2016?

Today’s cyber criminals are dedicated, organised, well-financed and intelligent individuals bombarding organisations with ever-changing attack tools and vectors. They are motivated by money and financial incentives to attackers are high which isn’t surprising considering the industry is now worth more than a whopping $1 trillion! Cyber attacks today are run in a professional manner where strategy and tactics are well executed.

Fingerprinting Cyber Attackers

Traditional network security struggled to keep up with threats and attacks however now with next generation firewalls are able to highlight unique, targeted attacks and take action. Next generation firewalls such as Magnet Protect, powered by Palo Alto Networks, can identify who is behind the attacks and the techniques they used to infiltrate the network.

To find out more about these topics and more register for the Cyber Security Briefing today.

e-signature

Leave a Reply

Your email address will not be published. Required fields are marked *


*