Assuming a State of Compromise: Effective Detection of Security Breaches

  • Wednesday, June 5, 2013 | 2:10 PM – 3:00 PM | Orchid | Room: Room 4211

View all Sessions

Based on a number of global surveys, over 75% of security incidents are first detected by outside parties including business partners, customers, law enforcement and others. Yet in retrospect, the signs of an intrusion are visible throughout the organization. This discussion outlines the elements of a mature cyber security detection / response program.


This document was retrieved from on Wed, 26 Oct 2016 19:09:13 -0400.
© 2016 EMC Corporation. All rights reserved.