A horrific terrorist cyberattack has occurred on US critical infrastructure. Forensic examination of the attack reveals the terrorists were able to bypass critical infrastructure cyber-defense by going through a trusted business associate (your business or client) as a proxy for the attack. What will be your company’s, or client’s, defense in the eyes of the law and the general public?
cyber warfare & cyber weapons cyberterrorism hackers & threats risk management critical infrastructure
Share With Your Community