Menu

Hunting for Indicators of Compromise

  • Thursday, February 28, 2013 | 8:00 AM – 9:00 AM | Room: Room 309

View all Sessions

Attackers routinely bypass layered defenses to infiltrate networks undetected. They are adept at blending in and hiding in plain sight. Thankfully, they're also human. Like the rest of us, attackers reuse tools and techniques. Attendees will learn how to hunt for Indicators of Compromise to detect attacker activity, backdoors, stolen credentials and to scope the extent of an intrusion.

Participants

This document was retrieved from http://www.rsaconference.com/events/us13/agenda/sessions/186/hunting-for-indicators-of-compromise on Sun, 02 Aug 2015 02:15:00 -0400.
© 2015 EMC Corporation. All rights reserved.