This document discusses case studies of network breaches in virtualized environments. It provides an overview of the speaker's background and experience investigating cyber attacks. The document then outlines several past cases from 2011-2015, including nation state compromises and criminal organizations exfiltrating data. Tactics of advanced persistent threats and cybercriminals are converging. The presentation will explore a case study from Central Asia involving compromised government websites and the challenges of attribution.