Posted on
in Presentations
Although questionnaires and interviews may reveal much about a merger target, there is no substitute for an in-depth examination using tools that will inventory, poke, and prod the target’s network. Attendees will look at sandboxed due diligence targets using different toolsets to reveal data flows, vulnerabilities, and other internal and external threats.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community