8

oversight.house.gov€¦ · unpatched assets with the Security Operations Center (SOC) or the SOC escalating a series of suspicious events to those assets without including required

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: oversight.house.gov€¦ · unpatched assets with the Security Operations Center (SOC) or the SOC escalating a series of suspicious events to those assets without including required
Page 2: oversight.house.gov€¦ · unpatched assets with the Security Operations Center (SOC) or the SOC escalating a series of suspicious events to those assets without including required
Page 3: oversight.house.gov€¦ · unpatched assets with the Security Operations Center (SOC) or the SOC escalating a series of suspicious events to those assets without including required
Page 4: oversight.house.gov€¦ · unpatched assets with the Security Operations Center (SOC) or the SOC escalating a series of suspicious events to those assets without including required
Page 5: oversight.house.gov€¦ · unpatched assets with the Security Operations Center (SOC) or the SOC escalating a series of suspicious events to those assets without including required
Page 6: oversight.house.gov€¦ · unpatched assets with the Security Operations Center (SOC) or the SOC escalating a series of suspicious events to those assets without including required
Page 7: oversight.house.gov€¦ · unpatched assets with the Security Operations Center (SOC) or the SOC escalating a series of suspicious events to those assets without including required
Page 8: oversight.house.gov€¦ · unpatched assets with the Security Operations Center (SOC) or the SOC escalating a series of suspicious events to those assets without including required