Tuesday, September 25, 2018 at 2 PM ET
Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies. Not everyone has the technical wherewithal, financial resources and the massive amount of hardware to build their own cyrptomine, so what options do they have? The answer is simple and as old as time: If you don’t have the resources, you “borrow” (steal?) from someone who does. Today’s webcast looks at how cryptomining works and how to determine if your computing resources are being used without your knowledge for cryptomining.
Mining for cryptocurrencies is no small task; it takes a lot of CPU and GPU cycles to process the data necessary to generate the currencies.

Not everyone has the technical wherewithal, financial resources and the massive amount of hardware to build their own cryptomine, so what options do they have? The answer is simple and as old as time: If you don’t have the resources, you “borrow” from someone who does.

This webcast looks at how cryptomining works and how to determine if your computing resources are being used without your knowledge for cryptomining.

 
Presenter
Dr. Yonesy F. Núñez
Senior Vice President, Group Information Security Leader
Wells Fargo
View Biography
Presenter
Richard Fairhurst
Senior Vice President, Enterprise Information Security
Wells Fargo
View Biography

Registration details:

By registering you are accepting our Privacy Policy and Terms of Use.

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.

(*) denotes required form field(s)

Submit