How do I hack thee, let me count the ways: Phishing employee emails; POS systems; store networks; corporate networks; and payment processors are just the start of the list. A chain of stores distributed over wide geographic areas makes it a challenge to manage IT security consistency; auditing, software updates and patches, and any other measure needed to conduct business. This session will explore the numerous ways retailers may be leaving themselves exposed.
Thursday, June 13
201 D, Level 2
Mitigating cyber threats: Start with the basics