A lot of the research would involve primary data collection, sifting through government policy and strategy papers, reports of forensic incidents, including the kinds of reports that Maverick’s company, Maverick Shih from Acer Cyber Security, could provide.

Keyboard shortcuts

j previous speech k next speech