Star 0

Abstract

Have you ever wanted to go behind the velvet ropes and have an all access pass to one of those top secret, closed door meetings where key government and private-industry leaders shared their working knowledge of cybersecurity policy developments, the latest technology initiatives being adopted to combat cybersecurity threats and the best practices for managing access to electronic information?