Posted on
in Presentations
A horrific terrorist cyberattack has occurred on US critical infrastructure. Forensic examination of the attack reveals the terrorists were able to bypass critical infrastructure cyber-defense by going through a trusted business associate (your business or client) as a proxy for the attack. What will be your company’s, or client’s, defense in the eyes of the law and the general public?
Participants
Andrew Peck
Participant
United States Magistrate Judge, United States District Court Southern District of New York
Share With Your Community