Evolution of Hackers and Reverse Incident Response
Today’s hackers are evolving and adapting. Understanding their motivation and capabilities will help deter them. Investigating a breach through a hacker’s eyes brings a new perspective to information security. We will share our experience behind identifying and then investigating a breach by monitoring hackers. We will also discuss mapping stolen data back to its owners and containment techniques.