This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative gain access to Federal.

Contact Your Representative
Or Call Us: 1-888-670-8889

Date published:


Low-tech attacks continue to reign supreme as the most effective vectors for breaching target organizations. Explore some of the lessons learned from one of the world’s most sophisticated threat actors, how they breached the Democratic Party of the United States, influencing the outcome of the 2016 US Presidential Campaign.
  • Shaunna Jackson