1. Moscone North

A state-sponsored group targeted multibillion-dollar industry trade secrets and IP. Interconnected, poorly secured supply chain environments allowed these adversaries to move laterally and achieve their primary objectives. After breach identification, what’s next? This real-world intrusion will serve as the backdrop for an Incident Response Plan demonstration.