Menu

Applying OODA and Feedback Loops to Security Processes

Learn how to apply security-enhancing ICS/SCADA/Heathcare feedback and OODA loops into applications and networking for greater operational stability.

Speaker

Headshot

Winn Schwartau Founder, The Security Awareness Company

← View more Videos

This document was retrieved from http://www.rsaconference.com/videos/applying-ooda-and-feedback-loops-to-security-processes on Thu, 18 Jan 2018 03:06:35 -0500.