About this talk:
Cyber attackers want access to the user’s sensitive information or intellectual property for strategic advantage, or more commonly, for monetary gain. They commonly attempt to exploit vulnerabilities in the user’s computer system and network by using malware delivered via email or web servers.
This session will be dedicated to a discussion of the security exploits that can be prevented by applying ISGs.
ISGs can be found in this publication repo: https://nsacyber.github.io/publications.html
Back to list of all Training Sessions