Near Real-Time Multi-Source Flow Data Correlation
• Presentation
In this presentation, Carter Bullard discusses the role of flow data in cyber security incident response.
Publisher
Software Engineering Institute
Topic or Tag
Abstract
This presentation discusses how to assist in a security incident response, recognizable hostile activity needs to be associated with other information system behavior in order to understand the complete cyber security incident life cycle. However, for most existing protection strategies, this isn't detectable.
Part of a Collection
FloCon 2013 Collection
This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.