It is no secret that bad guys are attacking your network every day. Nor should it surprise anyone that bad guys are already inside your network looking for data to exfiltrate. This eSymposium will look at approaches companies can take to find those attackers who already have ferreted in to your network and are slowly draining valuable corporate data. We also will look at approaches to identify potential attacks vectors so that the security can focus on the anomalies while allowing regular business traffic to pass through the network.