SECURITY THREATS AND EXPLOITS
Talks in these sessions focus on attacks and exploits aimed at damaging or disrupting computer networks or systems through unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
- Intrusion Detection and Prevention
- Security Risk Management
- Vulnerability Management
- Dark web
- Incident response (breach notification, eradication, remediation/reverse malware engineering, investigation/forensics)