Hunting for Indicators of Compromise

  • Thursday, February 28, 2013 | 8:00 AM – 9:00 AM | Room: Room 309
View all Sessions

Attackers routinely bypass layered defenses to infiltrate networks undetected. They are adept at blending in and hiding in plain sight. Thankfully, they're also human. Like the rest of us, attackers reuse tools and techniques. Attendees will learn how to hunt for Indicators of Compromise to detect attacker activity, backdoors, stolen credentials and to scope the extent of an intrusion.


This document was retrieved from on Thu, 05 Mar 2015 21:25:32 -0500.
© 2015 EMC Corporation. All rights reserved.