Menu

Ghosts in the Shadows

  • Thursday, March 3, 2016 | 10:20 AM – 11:10 AM | West | Room: 3004

View all Sessions

Limited stealth operations allow organizations of all sizes to bolster their risk management program by enriching security data with data derived directly from the sources of risk. By embedding highly specialized teams of specially trained cyber-counterintelligence forces embedded deeply within the hackers trust zone, organizations can measurably achieve proactive gains in their security posture.

Participants

This document was retrieved from http://www.rsaconference.com/events/us16/agenda/sessions/2401/ghosts-in-the-shadows on Mon, 23 Jan 2017 01:32:15 -0500.
© 2017 EMC Corporation. All rights reserved.