The Art of Attribution: Identifying and Pursuing your Cyber Adversaries

  • Tuesday, February 25, 2014 | 2:00 PM – 2:20 PM | West | Room: 3022

  • Friday, February 28, 2014 | 11:40 AM – 12:00 PM | North | Room: 130

View all Sessions

Imagine someone physically breaks into your company's offices and goes through all your files—would you not want to know if it was your competitor or a petty thief? Would you not want to know the answer to the same question if the intrusion had been virtual? Find out why cyber attribution is critical to your business security strategy and learn how to identify and pursue your cyber adversaries.


This document was retrieved from on Fri, 19 Apr 2019 08:41:00 -0400.