In this session, participants will examine how to identify the unknown threat, how it infects infrastructures, how it is propagated, how it owns the networks and the solution to this threat. We will review the differences between known and unknown t...