How Do You Detect Attacks?

  • Wednesday, March 2, 2016 | 2:10 PM – 3:00 PM | West | Room: 2021

View all Sessions

We face a plethora of options for detecting advanced attacks from anomaly detection to pattern recognition to crowdsourcing of signatures. But what works? Participants will have the opportunity to talk about their experiences with detection products, hunting techniques, SIEM correlation rules, threat feeds and other methods. This session will seek to break through the spin and identify solutions.


Related Blog Posts

This document was retrieved from on Fri, 21 Oct 2016 10:53:04 -0400.
© 2016 EMC Corporation. All rights reserved.