Applying OODA and Feedback Loops to Security Processes

Applying OODA and Feedback Loops to Security Processes

RSA Conference via YouTube Direct link

Intro

1 of 34

1 of 34

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Applying OODA and Feedback Loops to Security Processes

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Feedback Basics
  3. 3 Feedback Abstraction
  4. 4 The Premises of Feedback in Networks
  5. 5 SCADA Feedback
  6. 6 World's Largest Feedback Network
  7. 7 Where is Network Security Feedback?
  8. 8 OODA Loop Feedback
  9. 9 OODA With More Feedback
  10. 10 Pen-testers understand OODA intuitively
  11. 11 OODA in Learning: Positive Feedback
  12. 12 Synaptic Weighting in Neural Networks
  13. 13 Feedback Enables Metrics
  14. 14 Door Alarms with Feedback
  15. 15 Banking Verification with OOB Feedback
  16. 16 My Wife's Car Does This
  17. 17 Feedback in a Security Process (with time)
  18. 18 Feedback Based Truth Table
  19. 19 Testing Vendor Claims with Feedback
  20. 20 Using Feedback to Measure Security Performance
  21. 21 OODA Loop Detection
  22. 22 Add Negative Time
  23. 23 Feedback for Phishing
  24. 24 Stopping DDoS with Feedback
  25. 25 Measuring DDoS Products
  26. 26 Adding an OOB Channel
  27. 27 When Primary Comm is DOS'd
  28. 28 The Planet
  29. 29 Two DDoS Architectures w/OOB Feedback
  30. 30 Feedforward & Negative Time
  31. 31 1st Hop DDoS Protection
  32. 32 Multi-Tier Feedback (DDoS)
  33. 33 A Few Network Security Feedback Tenets
  34. 34 What Can You Do Now?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.