Checkmate: Stopping a Hospitality Breach

  • A walkthrough of a typical security breach
  • The complexities of attribution
  • Approaches for detecting and stopping threats