Killing the Kill Chain: Disrupting the Cyber Attack Progression

  • Tuesday, April 21, 2015 | 1:10 PM – 2:00 PM | North | Room: 132

View all Sessions

Exploits for high impact vulnerabilities are often made available minutes after being announced. A point of ingress is identified, malware spreads, privileges are escalated, and exfiltration of high value data begins. As Hudson said, "Game over, man! Game Over!"  Or is it? Join us, as we stop attacks before they start, identify hacks already in progress and, ultimately, ruin the attacker's day.


This document was retrieved from on Fri, 24 May 2019 22:15:25 -0400.