Ok
Cancel
Don't show this message again
-
Ok CancelDon't show this message again
Network Vulnerabilities: Tips for Understanding and Assessing Vulnerabilities That Threat Actors Use to Compromise Your Electronic Data
Debra Geroux , Shareholder , Butzel Long.
Scott Wrobel , Managing Member , N1 Discovery.
2023-10-30
-
A non-technical overview of the types of audits and assessments that can be done to identify vulnerabilities that threat actors use to gain access to your data
-
Understanding where PHI/PII is located on your system, who has access to the data, how the data is protected and who is access tested/monitored
-
Overview of some methods to test your systems, including tabletop exercises and purple team ad threat simulation exercises
-