Data Driven Computer Defense - Implementation Examples The SafeHouse
-
- Technology
Podcast 4: Volume 5: In our final series episode, Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to reveal Implementation Examples of a Data-Driven Computer Defense, which is Part 3 of his new book covering Chapters 9 – 13.
Learn more about Rogers Book, Data-Driven Computer Defense: https://www.amazon.com/Data-Driven-Computer-Defense-Way-Improve/dp/1092500847
Edited and Produced by David Lewis
Podcast 4: Volume 5: In our final series episode, Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to reveal Implementation Examples of a Data-Driven Computer Defense, which is Part 3 of his new book covering Chapters 9 – 13.
Learn more about Rogers Book, Data-Driven Computer Defense: https://www.amazon.com/Data-Driven-Computer-Defense-Way-Improve/dp/1092500847
Edited and Produced by David Lewis
33 min