Three Ways to Lose Data and One Way to Stop It

  • Wednesday, February 29, 2012 | 9:30 AM – 10:20 AM | Room: Room 301

View all Sessions

This session will present case studies of data theft by three different attackers – insiders, outsiders and malware. Our findings reveal that these attackers employed similar techniques that defenders can exploit to mitigate or altogether prevent these attacks from being successful. We will demonstrate how one such defensive strategy, using open source tools, can be used to accomplish this goal.


This document was retrieved from on Sat, 20 Jul 2019 22:43:59 -0400.