Star 0

Abstract

Many companies now participate in government programs that provide access to classified cyber threat information.  How do you use these programs to secure your networks and data? The purpose of this session is to share best practices and brain storm more effective, efficient ways to access and use this information; all within legal limits and respecting important national security interests.