|Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
A horrific terrorist cyberattack has occurred on US critical infrastructure. Forensic examination of the attack reveals the terrorists were able to bypass critical infrastructure cyber-defense by going through a trusted business associate (your business or client) as a proxy for the attack. What will be your company’s, or client’s, defense in the eyes of the law and the general public?