Network Vulnerabilities: Tips for Understanding and Assessing Vulnerabilities That Threat Actors Use to Compromise Your Electronic Data

Debra Geroux , Shareholder , Butzel Long.

Scott Wrobel , Managing Member , N1 Discovery.

2023-10-30

  • A non-technical overview of the types of audits and assessments that can be done to identify vulnerabilities that threat actors use to gain access to your data

  • Understanding where PHI/PII is located on your system, who has access to the data, how the data is protected and who is access tested/monitored

  • Overview of some methods to test your systems, including tabletop exercises and purple team ad threat simulation exercises

This document is only available to subscribers