Do you find it flattering that you are being invited to many exclusive ‘invitation only’ events? But what if I told you that you just might be the target of hackers… and not just any hackers – but APT’s! Good mitigation for these kinds of threats begins with talking to your colleagues and sharing this information with your network of cybersecurity professionals.
Being flattered or eccentric in these communications is akin to a priority 1 (P1) vulnerability - it doesn't get anymore serious than that!
Lamont Robertson
M.S., M.A., CISSP, CISM, CISA, CRISC, CDPSE, MCSE