Are you creating a potentially massive vulnerability when decommissioned hardware leaves the premises?
Exploiting a vulnerability or spearphishing for credentials is hard work. But, someone can easily purchase them on the sprawling secondary hardware market.
Presenters in this session tested the hypothesis that decommissioning processes may not wipe a device clean, leaving critical data from the previous owner accessible and open to abuse. Come hear what was accessed and the potential damage it could cause.
Register by filling out the form below.