A Chief Information Security Officer (CISO) is concerned that a specific threat actor who is known to target the company’s business type may be able to breach the network and remain inside of it for an extended period of time. Which of the following techniques should be performed to meet the CISO’s goals?
gomet2000
8 months, 3 weeks agoChiniwini
9 months, 2 weeks ago