Talks in these sessions focus on attacks and exploits aimed at damaging or disrupting computer networks or systems through unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
- Intrusion Detection and Prevention
- Security Risk Management
- Vulnerability Management
- Dark web
- Incident response (breach notification, eradication, remediation/reverse malware engineering, investigation/forensics)