Inside real APT

We'll delve into comm's resulting from infiltrating C2 (command and control) so attendees can see what "APT" actually looks like and (more importantly) how to detect and deal with them. No smoke and mirrors here. Just the real deal on scumbags p0wning our networks.

Presented by