Posted on
in Presentations
Ransomware can easily elevate from a potential data loss to potential identity theft to a data breach in the form of extortion. How can internal audit help in the investigation of such attacks and assess if IT has taken sufficient actions to handle these and prevent such attacks from recurring? How would we know what extent the cyber kill chain has been successfully executed?
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community