
Jay Krous
Cyber Security,
Lawrence Berkeley National Laboratory
OUTCOMES: Understand how a large-scale NSM monitoring setup operates * Learn various strategies used to identify good and bad in the network * Learn how to prioritize response-based degrees of "badness" identified * Exchange stories from the battlefield