It is no longer a question of will you be breached but rather when and how. The key to surviving a breach is finding it quickly and taking the appropriate actions to eradicate them. But what happens if the breach you discover has been festering for a long time – months or perhaps years? How can you determine the damage the breach has done and all of the potential tentacles it has sent out throughout your network? This SC Virtual Conference will address the actions to take when a well-entrenched breach is identified, how to eradicate it, and how to follow the threads to find out how deeply this attack went into your network.