Do you consider information asset owner's behavior and goals as primary security strategy driver? Who are they? Are they corporate leaders, or they're just custodians whether real asset owners are customers, state entities and counter parties?
— Oleksandr Bodryk (@obodryk) April 15, 2019
from Twitter https://twitter.com/obodryk
Комментариев нет:
Отправить комментарий