Posted on
in Presentations
Hackers target your third-party suppliers and the cloud, with an ever-increasing focus on data theft. In this fast-paced exercise, participants will respond to a modern cyber extortion scenario, guided by seasoned experts. Will collaborate and determine the organization’s course of action at each stage. Join to experience a third-party ransomware incident and hone your response.
Share With Your Community