Guarding Against Dormant Threats
- Identify dormant threat vectors
- Discover how threats can enter a protected network
- Identify the consequence of AV update cycles on stored data
- Learn techniques to protect data behind secure perimeters