1. How Targeted Attacks Evade Anti-Virus Software© 2012 Imperva, Inc. All rights reserved. 2. Agenda Compromised insiders defined The anatomy of a compromised insider…