̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
Illicit shadow fleets are a growing threat to global security. These vessels, operating outside the law, help adversarial nations evade sanctions and finance their operations. Shadow fleets also pose a new risk of hybrid warfare, as seen in recent high-sea sabotage incidents in Europe. Opaque ownership structures and hidden networks make shadow fleets hard to track, but they aren’t invisible
Watch this on-demand webianr, where we show you how to use corporate and trade records to pierce the veil of secrecy surrounding these actors. You’ll learn how to begin identifying actors behind shadow fleet networks, enabling more effective countermeasures and strategies for disrupting their activities.
Key takeaways include:
Are you working overtime trying to govern and secure your institution’s Microsoft 365 environment? Download our report, Microsoft 365 Security: A Deep Dive Into The Challenges of Governance & License Management, to learn the most common governance and license management problems in Microsoft 365.
Fill out the form below to view this Resource.