Whether you love or hate the term APT, the reality is the same. The objective is to identify weaknesses at the endpoints and servers, escalate privileges on those systems, set-up camp, exfiltrate data and then cover their tracks. It is critical that you lock down your infrastructure by deploying preventative controls across endpoints and servers AND evaluate the information that is created by those solution to identify when anomalous behavior occurs in your environment. At the control level both NIST and CIS agree must execute these steps you must put into place key functionality like file integrity monitoring, intrusion prevention, virtual patching, device and OS hardening. Additionally, you need to see daily, weekly, monthly baselines and trends for these controls. In this session, we will help you understand how to achieve these critical security objectives. Conventus is a global leader in infrastructure security with a focus on server security. We have deployed several of the largest CSP deployments in the world.