Learn how modern Ransomware Extortion attacks happen from Risky Vendors and External Exposures to Lateral movement. Discover the best practices to disrupt the attack chain and prevent devastating cyber incidents.
Smart Energy, Digital Defense, AI Boosters, AI Ethics
Exhibitors
QOMPLX
Slides from the presentation will be visible on this site if the speaker in question wishes to share them.
Please note that you need to be signed in in order to see them.