0
Skip to Content
Winn Schwartau
About
Speaking
Writing
Blog
Where's Winn?
Contact
METAWAR
Winn Schwartau
About
Speaking
Writing
Blog
Where's Winn?
Contact
METAWAR
About
Speaking
Writing
Blog
Where's Winn?
Contact
METAWAR
  • Analogue Network Security,
  • Conference,
  • Time-Based Security,
• 2/23/17

Applying OODA and Feedback Loops to Security Processes

Learn how to apply security-enhancing ICS/SCADA/Heathcare feedback and OODA loops into applications and networking for greater operational stability.

Previous

Ethical Bias in AI-Based Security Systems: The Big Data Disconnect

Next

PhreakNIC 19 - Analog Network Security - Winn Schwartau

You Might Also Like

Related Embedded Video Item Thumbnail The Future of Your Cybersecurity Career: Market Demand VS Talent Shortage
Related Embedded Video Item Thumbnail 🇬🇧 The Metawar Thesis: How To Adapt to and Coexist with the Technologies We Have Created
Related Embedded Video Item Thumbnail DEF CON 30 - Winn Schwartau - My First Hack Was in 1958
Related Embedded Video Item Thumbnail Hacker Heroes - Winn Schwartau - PSW #825
Related Embedded Video Item Thumbnail CC9 T1H Winn Schwartau - The Art & Science of Metawar

Winn Schwartau

© 2024 Winn Schwartau

About

Speaking

Writing

Blog

Get in Touch