Applying OODA and Feedback Loops to Security Processes
Learn how to apply security-enhancing ICS/SCADA/Heathcare feedback and OODA loops into applications and networking for greater operational stability.
Previous
Winn Schwartau - The Future Of Security - Defcon 2017
Next