Download pdf
Ransomware can easily elevate from a potential data loss to potential identity theft to a data breach in the form of extortion. How can internal audit help in the investigation of such attacks and assess if IT has taken sufficient actions to handle these and prevent such attacks from recurring? How would we know what extent the cyber kill chain has been successfully executed?