icon-carat-right menu search cmu-wordmark

From Data Collection to Action: Achieving Rapid Identification of Cyber Threats and Perpetrators

Presentation
In this presentation, Joel Ebrahimi shows how to use data retention to identify cybersecurity threats and learn what capabilities cyber analysts must have.
Publisher

Software Engineering Institute

Abstract

In this presentation, given at FloCon 2011, Joel Ebrahimi shows how to use data retention to identify cybersecurity threats and learn what capabilities cyber analysts must have.

Part of a Collection

FloCon 2011 Collection

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.