For example, when there’s a incident reported by cyber security researchers, for example, iRent and many other private sector that’s not part of the Cyber Security Management Act, the NICS is activated by receiving these reports from say, TWCC and other CERT emergency response teams.

Keyboard shortcuts

j previous speech k next speech