Loading Events

Why focus on potential zero day attacks, when the vast majority of successful attacks use known vulnerabilities?  This short presentation includes a brief analysis of a successful attack on the US Government and then describes a number of common cyber security myths and their real world solutions.  It ends by recommending a standard set of security controls that have been developed over many  years by the US Department of Defense.

Share This Story, Choose Your Platform!

Title

Go to Top