


The Building’s on Fire! Optimizing Procurement & Prioritizing Security
We open our discussion today with a scenario of a phishing attack, that has been plaguing a company for weeks now, let’s call them Firetronics. The CISO, CIO, and SOC have had several meetings about this attack, it seems they have an extremely persistent attacker. The...