You’ll learn how to identify an online compromise and the methods for assessing its impact, including how to: - Recognize the signs of a sophisticated attack, even when it’s well-obfuscated
- Determine the extent of an online attack, and its methods for penetrating your systems
- Assess the potential impact of the attack, on both a system level and on a business level
Come for one session or stay for the day and listen to online keynote presentations and virtual panels, where some of the industry’s top experts on cyber defense and incident response will join with Dark Reading editors to help you get a deeper look at how breaches occur, how to detect them, and how to build a strategy for swift response. |