Finding an attacker on a single system is tricky and time consuming. 'Doing it when you have an enterprise network is painful beyond belief. 'Attendees of this webcast will learn tons of network, system, and log base lining techniques so they can know what normal is.