DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade Activities During...

1. Using a CVA to Optimize ICS UpgradeActivities During a TurnaroundJim GilsinnKenexis Security 2. Presenter Jim Gilsinn– Senior Investigator, Kenexis Security– Current…