In this Micro Training, we’ll take a closer look at the specific methods attackers use to compromise these vital systems.

Quick Tips

  • It’s important to know that, while you may not work directly in the critical infrastructure sector, the effects of an attack can still reach you.
  • Insider threats can often bypass traditional cybersecurity defenses, as the activity originates within the organization.