Audrey Tang

And so, we receive not just like threat indicators and things that you probably are familiar with, but actually research support as well from them to try to suss out the weakness in our connectivity, the topology and things like that. And just preemptively tell us where are the points that we still need to strengthen on.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech