Ghosts in the Shadows

  • Thursday, March 3, 2016 | 10:20 AM – 11:10 AM | West | Room: 3004

View all Sessions

Limited stealth operations allow organizations of all sizes to bolster their risk management program by enriching security data with data derived directly from the sources of risk. By embedding highly specialized teams of specially trained cyber-counterintelligence forces embedded deeply within the hackers trust zone, organizations can measurably achieve proactive gains in their security posture.


This document was retrieved from on Sat, 22 Oct 2016 07:41:09 -0400.
© 2016 EMC Corporation. All rights reserved.