CCT 069: Practice CISSP Questions - Data Collection, Location, and Destruction (D2.4)

CISSP Cyber Training Podcast - CISSP Training Program - A podcast by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Categories:

Send us a textImagine a world where a simple radio command halts an entire railway system. That's exactly what happened in Poland recently, and we're here to break down the intricate details of this cyber-attack. We'll reveal how the Polish radio stop command system was exploited, unraveling the mystery behind this major disruption. From there, we'll navigate the tricky waters of personal identifiable information (PII), data destruction, and data sovereignty, arming you with insights and stra...