Identifying Malicious Activities during Mergers

Sign in to queue

Description

So you're firm is going through a merger. Are you prepared to connect their potentially compromised network to yours? And what if your network is the one that's infected?

Embed

Download

Download this episode

The Discussion

Add Your 2 Cents