Star 0

Abstract

This session will present case studies of data theft by three different attackers – insiders, outsiders and malware. Our findings reveal that these attackers employed similar techniques that defenders can exploit to mitigate or altogether prevent these attacks from being successful. We will demonstrate how one such defensive strategy, using open source tools, can be used to accomplish this goal.