The speaker discusses their immediate response to a security breach, focusing on next steps and forensics. They identify and fix the vulnerability and take responsibility for their actions.
GoodListen © 2023
About
Privacy Policy
Terms of service
Support
Blog
Search Podcasts
Podcasts