0
Skip to Content
Winn Schwartau
About
Speaking
Writing
Blog
Where's Winn?
Contact
METAWAR
Winn Schwartau
About
Speaking
Writing
Blog
Where's Winn?
Contact
METAWAR
About
Speaking
Writing
Blog
Where's Winn?
Contact
METAWAR
  • Analogue Network Security,
  • Conference,
  • Time-Based Security,
• 2/23/17

Applying OODA and Feedback Loops to Security Processes

Learn how to apply security-enhancing ICS/SCADA/Heathcare feedback and OODA loops into applications and networking for greater operational stability.

Previous

Winn Schwartau - The Future Of Security - Defcon 2017

Next

Hiring the Unhireable

You Might Also Like

Related Embedded Video Item Thumbnail Ep 218 Man vs Cybersecurity w special Guest Winn Schwartau
Related Embedded Video Item Thumbnail #HITBGSEC 2015 - Winn Schwartau - Keynote 3: Analogue Network Security
Related Embedded Video Item Thumbnail CC7 D02 T01 11AM Winn Schwartau Defending Security is Probabilistic, Not Deterministic: Get Over It
Related Embedded Video Item Thumbnail 2 Minutes on BrightTALK: Can Simplicity Help Your Application Security?
Related Embedded Video Item Thumbnail CC9 T1H Winn Schwartau - The Art & Science of Metawar

Winn Schwartau

© 2024 Winn Schwartau

About

Speaking

Writing

Blog

Get in Touch
Get in Touch