Quote:
Originally Posted by CoachKandSportsguy
Just to give everyone comfort as to training at utilities, we actually see demos of actual software used in phishing attacks against us, as well as study other attack vectors from actual attacks. . .
it guy wanting to leave it
|
Sounds good, glad to hear it seems to be taken seriously. I expect it is not a question of IF we will be attacked, but when. With sufficient training and preparation I have no doubt we will survive it. Sounds like you have some interesting experience, I am a bit sad I am a bit over the hill for Cyberwarfare work, it would intrigue me.
I keep a sandboxed system on my desk setup as a honey pot and occasionally catch something interesting. But, I don't have the time to mess with it much anymore.