As the Internet of Things (IoT) continues to evolve, hackers will exploit the diverse entry points with a growing attack surface and evolving technologies such as mobile communication, cloud computing, including transportation with digital transformation.The content of this workshop was developed by experts in the field.

At the conclusion of this workshop, you will be able to:

  • Describe the cyber security framework
  • ¬†Understand how to detect different types of breaches and malware
  • Identify the security exposures in emails that make your network vulnerable to breaches
  • Select the right solutions for ¬†your cyber security environment
  • Identify types of attacks and how to prevent them