Some thoughts on prioritizing cyber-security mitigations for securing information technology supply chains
I will give a high level talk about current research that studies how to prioritize cyber-security mitigations. I will talk about information technology supply chains, attack graphs, set cover variations, and budgeted maximization of submodular functions.