Star 0

Abstract

Breached PII is widely available and is being utilized to orchestrate attacks on individuals. Learn what to do about it.

2:20 PM: Hacking Healthcare; Paul Dant, Chief Strategist & Managing Principal, Independent Security Evaluators
2:50 PM: How’d This Happen? A Journey in PII Pwned Reconciliation; Chad Skipper, Distinguished Engineer, Dell