search menu icon-carat-right cmu-wordmark

From Data Collection to Action: Achieving Rapid Identification of Cyber Threats and Perpetrators

January 2011 Presentation
Joel Ebrahimi (Bivio Networks)

In this presentation, Joel Ebrahimi shows how to use data retention to identify cybersecurity threats and learn what capabilities cyber analysts must have.

Publisher:

Software Engineering Institute

Abstract

In this presentation, given at FloCon 2011, Joel Ebrahimi shows how to use data retention to identify cybersecurity threats and learn what capabilities cyber analysts must have.