Hunting for Indicators of Compromise

  • Thursday, February 28, 2013 | 8:00 AM – 9:00 AM | Room: Room 309

View all Sessions

Attackers routinely bypass layered defenses to infiltrate networks undetected. They are adept at blending in and hiding in plain sight. Thankfully, they're also human. Like the rest of us, attackers reuse tools and techniques. Attendees will learn how to hunt for Indicators of Compromise to detect attacker activity, backdoors, stolen credentials and to scope the extent of an intrusion.


This document was retrieved from on Wed, 26 Oct 2016 03:35:30 -0400.
© 2016 EMC Corporation. All rights reserved.