At the end of successfully completing this challenges series, you will be able to:
identify cyber risks associated with new technical and business related features
realise each feature is subject to being attacked if there is a financial gain for adversaries
This category targets business features, how they can be/have been exploited, what risks and threats could be/have been exposed. Real-world incident references are made whenever possible. By learning known abusive factors, you'll be well-equipped for bad days.
Project Manager, Cyber Professional
How to start:
Click on your desired challenge from the left navigation panel.