Audrey Tang

And so, on the actor/behavior level, we see it as a cyberattack with the full kill chain, threat indicators, and things like that. So the question becomes, when this kind of foreign actor does this meddling behavior, and we receieve STIX for threats intelligence from our cybersecurity allies, how quickly can we take decisive action to stop the kill chain from activating?

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech