Identifying Malicious Activities during Mergers

Download this episode

Download Video


So you're firm is going through a merger. Are you prepared to connect their potentially compromised network to yours? And what if your network is the one that's infected?



Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums, or Contact Us and let us know.