Let’s start this discussion with a brief cybersecurity risk assessment:

1. Anything attached to a network can be hacked.
2. Everything is being attached to networks.
3. Everything is vulnerable.

Download Speech PDF