The term ‘advanced persistent threat’ has been used (and perhaps abused) by information security vendors and professionals for years, but has the information security industry reached an accurate consensus on what an APT actually is, and how to manage one? This session will look to define the term and questions whether APTs are overhyped, or indeed under-managed, and what information security professionals should be doing about them.