Posted By
Ed Murphy
12-17-2021 12:30:00 PM
Found In
Egroup:
Cybersecurity
\
view thread
There has been a lot of discussion on REN-ISAC lists, including all throughout last weekend. In my experience, those lists are where the majority of incident and vulnerability discussions occur. Also from the CISA MS-ISAC call that is wrapping up, a response playbook, https://www.cisecurity.or ...
|