Menu

Applying OODA and Feedback Loops to Security Processes

Learn how to apply security-enhancing ICS/SCADA/Heathcare feedback and OODA loops into applications and networking for greater operational stability.

Speaker

Headshot

Winn Schwartau Founder, The Security Awareness Company

← View more Videos

This document was retrieved from http://www.rsaconference.com/videos/applying-ooda-and-feedback-loops-to-security-processes on Mon, 20 Nov 2017 21:43:27 -0500.
© 2017 EMC Corporation. All rights reserved.