Setting up malicious software made to breach brick-and-mortar POS components and software and collect card details in the course of transactions Includes a new illustrative report That could be applied when performing and reporting on a SOC two+ evaluation. He is also the creator of above a dozen cybersecurity programs, https://www.nathanlabsadvisory.com/nerc-cip-compliance.html