CORE recently wrapped up its east coast Customer User Group road show through Atlanta, Washington DC, and Boston and to suggest that APT’s remain a huge concern for security directors would be a gross understatement.  During three days of interactive sessions with customers and prospects we learned that the majority of organizations are no closer to solving the APT problem than they were a year ago. Thanks to our guest speakers, including Eric Cole and agents from the FBI’s cybercrime unit, we also learned that the threats are only becoming more complicated, better financed, and more dispersed than ever.

When we hear nation states as it relates to cyber threats, we have always naturally assumed the likes of China and Russia.  Not so fast, we now know that attacks originating from countries such as India and Vietnam are on the rise. In fact, we are seeing a much more organized and concentrated effort across all of Southeast Asia as terrorist organizations have started putting less emphasis on physical attacks and have begun financing coordinated cyber-attacks.

The prevailing theme throughout the three days of discussions was the need to prioritize assets and become more predictive in assessing likely targets for an attack.  As nearly everyone agreed, the hackers are always a step or two ahead in disguising new threats, whether they are malware, botnets, or hardware, etc., it is nearly impossible to safeguard every point of entry into a network.  Therefore, assessing what the hackers are most likely after and locking those assets down has become paramount. All in all the roadshow was a resounding success.  We had more than 90% of registrants attend and the dialogue was lively and informative.  It’s clear that the security community has a lot on their minds these days and is turning to companies such as CORE for help in the never ending battle of network attacks.  While our guest speakers painted a somewhat ominous picture of the security landscape, it was not done the intent to scare attendees, but to provide a glimpse into the new realities of network security. We look forward to continuing these discussions and working with our customers to provide them with the predictive solutions needed to assess and mitigate risks to their most valuable data.