Menu

Applying OODA and Feedback Loops to Security Processes

Learn how to apply security-enhancing ICS/SCADA/Heathcare feedback and OODA loops into applications and networking for greater operational stability.

Speaker

Headshot

winn Schwartau Founder, Winn Schwartau, LLC

← View more Videos

This document was retrieved from http://www.rsaconference.com/videos/applying-ooda-and-feedback-loops-to-security-processes on Fri, 22 Feb 2019 11:35:57 -0500.