Session 1:

  1. Briefly review the Vector of Attack priority list
  2. Presentation from Individuals
  3. Discussions on presentations

BREAK (TBD)

Session 2:

  1. Continue discussions on presentations
  2. Discuss and document commonalities in attack vector mitigations
  3. Identify main gaps
  4. Discuss unique characteristics that attracts security problems


  • No labels