
A Hacker Tells His Story
Cybersecurity Today
00:00
Assume compromise and limit movement
Brian emphasizes assuming breaches will occur, encrypting data, and using red teams to discover weaknesses early.
Play episode from 41:02
Transcript

Brian emphasizes assuming breaches will occur, encrypting data, and using red teams to discover weaknesses early.