Applying OODA and Feedback Loops to Security Processes

Posted on in Presentations

Almost every serious engineering discipline uses feedback to maintain system control and stability—except for network security. Feedback mechanisms in electrical, acoustic and mechanical systems create a workable equilibrium to avoid chaotic runaway conditions. Schwartau will show how to apply ICS/SCADA-like feedback to security controls, policy and processes.

Winn Schwartau

Founder, SAC

critical infrastructure data security incident response intrusion prevention/detection access control


Share With Your Community