1. Melati 4011 Table C

The question about tracking adversaries in threat intelligence is long standing. If you have no attribution capability or plan, is there a benefit to tracking them? Extracting techniques, procedures and understanding capability is viewed as highly strategic. But how do you operationalise it? Join to discuss. Attendance is strictly limited to allow for a small group experience.

Participants: