The breach is only the prelude to the risk and damage from a hacker. Witness a live hacking demonstration of a common-looking USB device and learn about physical and digital methods of control to minimize lateral movement within an environment and halt exfiltration of your valuable data.