The Briefings Data Forensics & Incident Response track offers techniques that will help you understand how an attack unfolded, if and when a breach occurred, and how it can be prevented in the future. In Detecting Deep Fakes with Mice youll see how researchers worked to train different machines and creatures to detect real vs. fake speech in deep fake videos. The Enemy Within: Modern Supply Chain Attacks takes you behind the scenes of todays cloud-powered industries with a Microsoft security expert.”]

