
Sign up to save your podcasts
Or


APTS are typically driven by experienced cyberactors, significant funding and a target that possesses extremely sensitive data. The depth of these threats means that virtually no enterprise is immune, even those which have implemented highly sophisticated cybersecurity measures. In this podcast, ISACA® security experts Dustin Brewer and Frank Downs discuss how to identify APTs, what makes them unique and how any organization can fall victim to such a threat.
By ISACA Podcast4.4
3434 ratings
APTS are typically driven by experienced cyberactors, significant funding and a target that possesses extremely sensitive data. The depth of these threats means that virtually no enterprise is immune, even those which have implemented highly sophisticated cybersecurity measures. In this podcast, ISACA® security experts Dustin Brewer and Frank Downs discuss how to identify APTs, what makes them unique and how any organization can fall victim to such a threat.

13 Listeners