Conceptualizing attribution and why it matters

Benjamin Buchanan explains why successful network intrusion attribution requires a range of skills—management, time, leadership, stress testing, and more.

By Benjamin Buchanan
November 11, 2016
Open door Open door (source: Alex_Svenson via Pixabay)

This is a keynote highlight from the O’Reilly Security Conference in Amsterdam 2016. Watch the full version of this keynote on Safari.

You can also see other highlights from the event.

Learn faster. Dig deeper. See farther.

Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

Learn more
Post topics: Security
Share:

Get the O’Reilly Programming Newsletter

Get the O’Reilly Programming Newsletter