Posted on
in Presentations
Although questionnaires and interviews may reveal much about a merger target, there is no substitute for an in-depth examination using tools that will inventory, poke, and prod the target’s network. Attendees will look at sandboxed due diligence targets using different toolsets to reveal data flows, vulnerabilities, and other internal and external threats.
Join the RSAC™Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community