Best Practices to Stay Current on Latest Military controls on Intelligence Gathering and Cyberattacks
What is it about?
- “Temporary” controls under ITAR USML Category XI(b)
- State of the Wassenaar debated on ML 21 Cyber Warfare Software
- How can you differential “dual use” from “munitions” in the Cyber environment
- Case studies: surveillance vs breach detection