Some thoughts on prioritizing cyber-security mitigations for securing information technology supply chains

I will give a high level talk about current research that studies how to prioritize cyber-security mitigations. I will talk about information technology supply chains, attack graphs, set cover variations, and budgeted maximization of submodular functions.
July 2 @ 16:00
4:00 pm (1h)

Discovery Building, Orchard View Room

Laura Mclay