Cybersecurity: Evaluating & Selling

From
Revision as of 14:39, 6 September 2020 by BPeat (talk | contribs)
Jump to: navigation, search

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence