Download pptx
Download pdf
A horrific terrorist cyberattack has occurred on US critical infrastructure. Forensic examination of the attack reveals the terrorists were able to bypass critical infrastructure cyber-defense by going through a trusted business associate (your business or client) as a proxy for the attack. What will be your company’s, or client’s, defense in the eyes of the law and the general public?