icon-carat-right menu search cmu-wordmark

Near Real-Time Multi-Source Flow Data Correlation

Presentation
In this presentation, Carter Bullard discusses the role of flow data in cyber security incident response.
Publisher

Software Engineering Institute

Abstract

This presentation discusses how to assist in a security incident response, recognizable hostile activity needs to be associated with other information system behavior in order to understand the complete cyber security incident life cycle. However, for most existing protection strategies, this isn't detectable.

Part of a Collection

FloCon 2013 Collection

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.