This Quick Look provides a short preview of the full session at RSAC™ 2025 Conference, taking place April 28 to May 1, 2025. In this session we will dive into the different approaches threat actors have been implementing to avoid detection by security controls. To do this, speakers will look at how enterprises can hunt and triage suspicious activities across the network, cloud, and endpoint – those events that by themselves may be benign but when closely inspected reveal the attack vector.
See the full session here.