1. Analyze top threats for common computing environments, including corporate, mobile, and personal computing.
2. Explore countermeasures you can employ to avoid common pitfalls.
3. Discuss what to do if you fall victim and your network or computer systems become compromised.
Our daily activities increasingly rely on computer technology to accomplish our tasks. Threats are evolving, and it is increasingly important to take steps to address them. This session will discuss the top threats for common computing platforms, countermeasures to address these threats, and what to do if you fall victim.