Key Learning Points
- Journey through the Cyber Kill Chain to see how hacks are constructed
- Learn new techniques for detecting and responding to modern threats
- Learn how others are using ‘forensic residue’ to eliminate gaps in their InfoSec framework
Level Intermediate
Gaining visibility into every endpoint is an increasingly difficult but critical task. Come learn how you can use forensic residue to eliminate gaps in your InfoSesc framework and achieve 360° visibility across all your assets. Follow us down the Cyber Kill Chain to see how hacks are constructed.
About Mike Vizzi
Mike leads security services product marketing for Guidance, working with customers and product teams to innovate and launch solutions that solve modern day threat and forensic security challenges.
This session sponsored by Guidance Software.