Detecting the Undetectable

Download this episode

Download Video

Download captions

Download Captions

Description

It is impossible to prevent a determined adversary from breaking into a company. Therefore, the next best thing is early detection of a malicious invasion that allows defenders to minimize the damage. According to highly respected computer security reports, over 80% of data breaches would have been detected if the victims has just been looking at the data right in front of their eyes. Get ideas, tools, and techniques that will reveal the hidden advanced attacker and the rogue insider, using the intrusion detection techniques that have worked for many of the world’s best security companies. The ideas shared will not only be useful, but will challenge you to use your creative juices in designing the right early warning traps.

Tag:

Security

Day:

4

Level:

200

Session Type:

Overview

Code:

BRK2344

Room:

E450

Embed

Format

Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.