Got Breached? Determining the Extent of Your Intrusion (Digital Guardian)

Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
REGISTER NOW
  1. Moscone North

A state-sponsored group targeted multibillion-dollar industry trade secrets and IP. Interconnected, poorly secured supply chain environments allowed these adversaries to move laterally and achieve their primary objectives. After breach identification, what’s next? This real-world intrusion will serve as the backdrop for an Incident Response Plan demonstration.