In this presentation, we explain the challenges you will face on your IT security expedition.
Email hijacking, social engineering, ransomware and fraud attacks are probably the most prominent methods attackers use to compromise your systems and data.
Possible downtime, image damage or ransom demands are the consequence.
Using various threat scenarios, we will talk about how careful preparation, appropriate equipment and the right use of skills - as in an expedition - can reduce the dangers to a minimum.