@conference { , title = {Cyber security in practice: identifying areas of vulnerability.}, abstract = {Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.}, conference = {Scot-Secure 2015}, note = {Conference dates: 5 February 2015 School: iidi}, organization = {Holyrood, Edinburgh}, publicationstatus = {Unpublished}, url = {http://researchrepository.napier.ac.uk/id/eprint/8763}, keyword = {005.8 Data security, QA76 Computer software, Cyber-security, Centre for Distributed Computing, Networking and Security, AI and Technologies, Cybersecurity, risk assessment, risk management, organisational management;}, year = {2024}, author = {Buchanan, William J and Smales, Adrian} }