Hunting for Indicators of Compromise

  • Thursday, February 28, 2013 | 8:00 AM – 9:00 AM | Room: Room 309
View all Sessions

Attackers routinely bypass layered defenses to infiltrate networks undetected. They are adept at blending in and hiding in plain sight. Thankfully, they're also human. Like the rest of us, attackers reuse tools and techniques. Attendees will learn how to hunt for Indicators of Compromise to detect attacker activity, backdoors, stolen credentials and to scope the extent of an intrusion.

Participants

This document was retrieved from http://www.rsaconference.com/events/us13/agenda/sessions/186/hunting-for-indicators-of-compromise on Tue, 25 Nov 2014 15:46:23 -0500.
© 2014 EMC Corporation. All rights reserved.