Tabletop exercise:
You are the CISO, the company's top management has been hacked. The hack has been contained, but the threat actors are asking for ransom or the managements ChatGPT queries are leaked. What do you do?
You are the CISO, the company's top management has been hacked. The hack has been contained, but the threat actors are asking for ransom or the managements ChatGPT queries are leaked. What do you do?
