Star 0

Abstract

Attackers routinely bypass layered defenses to infiltrate networks undetected. They are adept at blending in and hiding in plain sight. Thankfully, they're also human. Like the rest of us, attackers reuse tools and techniques. Attendees will learn how to hunt for Indicators of Compromise to detect attacker activity, backdoors, stolen credentials and to scope the extent of an intrusion.