Applying OODA and Feedback Loops to Security Processes


Posted on in Presentations

Almost every serious engineering discipline uses feedback to maintain system control and stability—except for network security. Feedback mechanisms in electrical, acoustic and mechanical systems create a workable equilibrium to avoid chaotic runaway conditions. Schwartau will show how to apply ICS/SCADA-like feedback to security controls, policy and processes.


Participants
Winn Schwartau

Participant

Chief Visionary Officer , SchwartauHaus, LLC

critical infrastructure data security incident response intrusion prevention/detection access control


Subtopic


Share With Your Community