0
Skip to Content
Winn Schwartau
About
Speaking
Writing
Blog
Where's Winn?
Contact
METAWAR
Winn Schwartau
About
Speaking
Writing
Blog
Where's Winn?
Contact
METAWAR
About
Speaking
Writing
Blog
Where's Winn?
Contact
METAWAR
  • Analogue Network Security,
  • Conference,
  • Time-Based Security,
• 2/23/17

Applying OODA and Feedback Loops to Security Processes

Learn how to apply security-enhancing ICS/SCADA/Heathcare feedback and OODA loops into applications and networking for greater operational stability.

Previous

Winn Schwartau - The Future Of Security - Defcon 2017

Next

Hiring the Unhireable

You Might Also Like

Related Embedded Video Item Thumbnail Hiring the Unhireable
Related Embedded Video Item Thumbnail Ethical Bias in AI-Based Security Systems: The Big Data Disconnect
Related Embedded Video Item Thumbnail Analogue Network Security & How to Measure the Security of your Network Defenses Webinar
Related Embedded Video Item Thumbnail The Metawar With Winn Schwartau | The Christian Reeve Podcast #279
Related Embedded Video Item Thumbnail OMH International 2021: How to Measure your Security - Winn Schwartau

Winn Schwartau

© 2024 Winn Schwartau

About

Speaking

Writing

Blog

Get in Touch