Posted on
in Presentations
The cyberattacks you suffer are often part of larger strategic actions. National governments, interest groups and other entities regularly employ large numbers of cyberattacks to advance their strategic interests without necessarily carrying out those attacks themselves. They do this by influencing the way cyberattackers with more immediate motives choose their targets.
Learning Objectives:
1: Learn how to recognize the strategic cyber-actions behind individual attacks.
2: Learn how third parties are used to carry out strategic cyber-actions.
3: Learn how to take account of strategic cyber-actions in planning defenses.
Learning Objectives:
1: Learn how to recognize the strategic cyber-actions behind individual attacks.
2: Learn how third parties are used to carry out strategic cyber-actions.
3: Learn how to take account of strategic cyber-actions in planning defenses.
Access this and other Conference presentations with your free RSAC™ Membership. Your Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with peers and experts, and more.
Share With Your Community