Assuming a State of Compromise: Effective Detection of Security Breaches

  • Wednesday, June 5, 2013 | 2:10 PM – 3:00 PM | Orchid | Room: Room 4211

View all Sessions

Based on a number of global surveys, over 75% of security incidents are first detected by outside parties including business partners, customers, law enforcement and others. Yet in retrospect, the signs of an intrusion are visible throughout the organization. This discussion outlines the elements of a mature cyber security detection / response program.


This document was retrieved from on Sun, 04 Oct 2015 19:44:24 -0400.
© 2015 EMC Corporation. All rights reserved.