This session will focus on a tough topic for analysts: attribution. There are many types and methods of attribution, so we often talk past each other as we debate it. Participants will start by getting on the same page about attribution of cyber-adversaries. Using that common understanding, we will discuss and debate what works, what doesn’t, and how we can better tackle the challenge of attribution.
Hackers & Threats Analytics, Intelligence & Response
threat intelligence hackers & threats
Share With Your Community