Staying Ahead of the Security Curve with Finite Resources

Abstract

"Security begins at the planning phase." It sounds simple, but many approach security as an add-on. This presentation will include policies, planning, communications, and strategies used by the University of Cincinnati. Learn these strategies to assist with Internet worms such as Code Red, Nimda, and Slammer, minimizing impact on your network.

Download Resources