Although APT's can vary significantly from breach to breach, they generally have many common phases and mechanisms. In this session, we will define and describe the APT attack and defend lifecycle, provide an overview of how the day is structured and what we aim to achieve, answering such questions as:
See Also: 12 Top Cloud Threats of 2016
- What is "Trust" and how is it established?
- What is the standard lifecycle of the APT kill chain?
- How do we match each attack phase with the appropriate defense?