Thursday, November 1, 2018

How to use the OODA loop to improve network security

TechTarget
Latest Technology News & Expert Advice     November 01, 2018
TechTarget
Issue Highlights:
How to use the OODA loop to improve network security
How SOC metrics improve security operation centers' performance
Industries seek to improve third-party security risk controls
CISOs face third-party risk management challenges
How Avanade keeps pace with Microsoft and the market
How to use the OODA loop to improve network security
The OODA loop can be used to establish cyber deception against hackers to improve network security. Learn the OODA steps and how they can be applied to security with Kevin Fiscus.
How SOC metrics improve security operation centers' performance
With the use of security operations centers comes the need for effective security metrics to gauge SOC performance and improve security posture. Learn more with expert Nick Lewis.
Industries seek to improve third-party security risk controls
Healthcare security leaders are developing industry best practices for better third-party risk management using common assessment and certification standards.
CISOs face third-party risk management challenges
Security professionals understand all too well what's at stake, and that's why more companies look to tighten up security with third parties.
How Avanade keeps pace with Microsoft and the market
Systems integrator Avanade has had to adapt to Microsoft's evolution into an "ecosystem platform" that includes open-source software
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: