The Art of Attribution: Identifying and Pursuing your Cyber Adversaries

Imagine someone physically breaks into your company's offices and goes through all your files—would you not want to know if it was your competitor or a petty thief? Would you not want to know the answer to the same question if the intrusion had been virtual? Find out why cyber attribution is critical to your business security strategy and learn how to identify and pursue your cyber adversaries.



Dmitri Alperovitch Co-Founder & Chief Technical Officer, CrowdStrike

← View more Media

This document was retrieved from on Tue, 06 Oct 2015 10:48:37 -0400.
© 2015 EMC Corporation. All rights reserved.