At the end of this session, the participant should be able to recall the current and future cyber threat landscape, identify trends in cyber attacks, and recall how to manage risks related to the computer information systems and how risks impact the ability to be resilient in operations.
- Tags
-