What security exploits are prevented by implementing ISGs

When (day):
11th - Thursday
14:00 - 16:00
Zoom link will be available very soon

Training Session Video

About this talk:

Cyber attackers want access to the user’s sensitive information or intellectual property for strategic advantage, or more commonly, for monetary gain. They commonly attempt to exploit vulnerabilities in the user’s computer system and network by using malware delivered via email or web servers.

This session will be dedicated to a discussion of the security exploits that can be prevented by applying ISGs.

ISGs can be found in this publication repo: https://nsacyber.github.io/publications.html

What Security Exploits Are Prevented By Implementing ISGs

Session Materials

Back to list of all Training Sessions