Computer intrusion cases usually consist of Windows or *nixsystems, if you are lucky. Mac intrusion cases are a rare breed. These caseshave the potential to become more popular with the growing market share ofMacintosh systems. Many companies and government entities use Macs as theirpreferred system. This presentation and hands-on lab will introduce you toincident response and intrusion analysis of the Mac.