Skip to content

Details

Internet Defense - New infrastructure/application acquisitions, means problems, new threats, and new requirements. We’ll walk through building out a solution that can be used for network level data acquisition, analysis, and threat correlation. We’ll talk about tap locations, methodologies, preferred network interfaces, data analysis and threat correlation.

Members are also interested in