Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
Interested? We have you covered! This popular session will also be overflowed in The Session Viewing Point, West Level 2 Room 2004.
  1. West 2004 Screen 1

Sherlock Holmes would have been proud: advances in AI enable the profiling of hackers based on the specific behavioral and cognitive DNA traces left by the attacker at the crime scene. This series of case studies will build a strong forensic case against individual hackers and see how seemingly unconnected hacks are all done by the same mysterious criminal.

Pre-Requisites: Understanding of fraud fighting principals such as detection vs. FP and alert rate, digital signals (device, location, behavior), link analysis, common attack methods such as Account Takeover, RAT, Bot, Social Engineering

Download pdf