Menu

Applying OODA and Feedback Loops to Security Processes

Learn how to apply security-enhancing ICS/SCADA/Heathcare feedback and OODA loops into applications and networking for greater operational stability.

Speaker

Headshot

Winn Schwartau Expert, SAC/WinnSchwartau, LLC

← View more Videos

This document was retrieved from http://www.rsaconference.com/videos/applying-ooda-and-feedback-loops-to-security-processes on Sat, 21 Jul 2018 00:08:05 -0400.