Difference between revisions of "Cybersecurity"
(→Selling & Evaluating) |
|||
| Line 26: | Line 26: | ||
<youtube>xoBWBNsjWoM</youtube> | <youtube>xoBWBNsjWoM</youtube> | ||
<youtube>-5dr1DCh_CU</youtube> | <youtube>-5dr1DCh_CU</youtube> | ||
| + | <youtube>rcG_QL9GWaA</youtube> | ||
== General Cybersecurity == | == General Cybersecurity == | ||
Revision as of 13:20, 11 June 2018
Selling & Evaluating
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence
General Cybersecurity