From Data Collection to Action: Achieving Rapid Identification of Cyber Threats and Perpetrators
• Presentation
In this presentation, Joel Ebrahimi shows how to use data retention to identify cybersecurity threats and learn what capabilities cyber analysts must have.
Publisher
Software Engineering Institute
Topic or Tag
Part of a Collection
FloCon 2011 Collection
This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.