Modelling Advanced Persistent Threats
This session will focus on illustrating how nation states and complex actors leverage their resources effectively in attacking campaigns. Specific attacking techniques will be discussed in detail. We will discuss how obfuscation techniques are used to blind defenders and also delve into the complexities of defending against such actors in high speed networks servicing millions of devices.
See Also: Role of Deception in the 'New Normal'
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.