Through the eyes of a Cyber Criminal: planning an attack

Learn what data your organization is leaking and made readily available for Cyber Criminals to harvest and use to penetrate your organization with a more targeted attack.