Menu

Applying OODA and Feedback Loops to Security Processes

Learn how to apply security-enhancing ICS/SCADA/Heathcare feedback and OODA loops into applications and networking for greater operational stability.

Speaker

Headshot

Winn Schwartau Expert, SAC/WinnSchwartau, LLC

← View more Videos

This document was retrieved from http://www.rsaconference.com/videos/applying-ooda-and-feedback-loops-to-security-processes on Sun, 27 May 2018 23:16:49 -0400.