Before, During & After: Being Early in Cyber Mitigation Puts You in Control (Fox-IT)

  • Wednesday, October 30, 2013 | 12.00 – 12.15 hrs | Room: Demo Stage, Crypto Commons

View all Sessions

Cyber attacks are staged in before, during and after. After an attack, CERTs work at damage control and recovery. During an attack real-time detection is key. Criminals engage in malware, phishing and hybrid attacks, which need different approaches. Companies start to realize the key to control lies in the before phase. Understanding your adversary is key in fighting back. Fox-IT shows you how.

This document was retrieved from on Thu, 27 Jun 2019 08:16:40 -0400.