This session reviews state-of-the-art techniques employed by hackers to infiltrate corporate systems. The presentation explains how the intrusions operate and the various forms of damage caused by the intrusions. The session will also review defensive technology designed to prevent or respond to intrusions, including a discussion on case studies of responses.