• What are APTs and why is researching them so important?
• Why is naming the exact perpetrator of an APT such a complicated issue?
• How do we research APTs?
• What indicators do we look for?
• What have been some of the most interesting APTs that Kaspersky Lab has researched in recent years?