Computing and Information Technology

Industrial Security - Red Team Operations


Listen Later

Tiger Team assessments can be specifically tailored to a company's threats (encompassing IT, physical and human security) and reflect the actual risk for the company.
Thomas Hackner discusses all three areas and demonstrates typical vulnerabilities, along with the solutions required to protect companies.
The talk was part of Secure South West 8 at Plymouth University on 7 February 2017.
[(CC) BY-NC-SA 2.0 UK]
...more
View all episodesView all episodes
Download on the App Store

Computing and Information TechnologyBy Plymouth University