Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Applying OODA and Feedback Loops to Security Processes

RSA Conference via YouTube

Overview

Explore the application of OODA (Observe, Orient, Decide, Act) loops and feedback mechanisms to enhance security processes in a conference talk from the RSA Conference. Delve into the fundamentals of feedback systems and their abstractions, examining their implementation in various contexts such as ICS/SCADA, healthcare, and networking. Discover how these concepts can be leveraged to improve operational stability and security performance. Investigate the role of feedback in network security, penetration testing, and learning processes. Learn about practical applications, including door alarms, banking verification, and DDoS protection. Gain insights into measuring security performance, detecting threats, and implementing multi-tier feedback systems. Acquire valuable knowledge on integrating feedback loops and OODA principles into your security strategies for more robust and responsive cybersecurity measures.

Syllabus

Intro
Feedback Basics
Feedback Abstraction
The Premises of Feedback in Networks
SCADA Feedback
World's Largest Feedback Network
Where is Network Security Feedback?
OODA Loop Feedback
OODA With More Feedback
Pen-testers understand OODA intuitively
OODA in Learning: Positive Feedback
Synaptic Weighting in Neural Networks
Feedback Enables Metrics
Door Alarms with Feedback
Banking Verification with OOB Feedback
My Wife's Car Does This
Feedback in a Security Process (with time)
Feedback Based Truth Table
Testing Vendor Claims with Feedback
Using Feedback to Measure Security Performance
OODA Loop Detection
Add Negative Time
Feedback for Phishing
Stopping DDoS with Feedback
Measuring DDoS Products
Adding an OOB Channel
When Primary Comm is DOS'd
The Planet
Two DDoS Architectures w/OOB Feedback
Feedforward & Negative Time
1st Hop DDoS Protection
Multi-Tier Feedback (DDoS)
A Few Network Security Feedback Tenets
What Can You Do Now?

Taught by

RSA Conference

Reviews

Start your review of Applying OODA and Feedback Loops to Security Processes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.