Data Breach , Data Breach Prevention and Response Summit , Events

Trust and the APT Defense Framework
Trust and the APT Defense Framework

Although APT's can vary significantly from breach to breach, they generally have many common phases and mechanisms. In this session, we will define and describe the APT attack and defend lifecycle, provide an overview of how the day is structured and what we aim to achieve, answering such questions as:

See Also: Hide & Sneak: Defeat Threat Actors Lurking within Your SSL Traffic

  • What is "Trust" and how is it established?
  • What is the standard lifecycle of the APT kill chain?
  • How do we match each attack phase with the appropriate defense?

Background

Slide Previews

Slide Previews



Around the Network