Authors: Chris Hodson, Merike Kaeo, Aaron Stanley, Sounil Yu
Abstract
What does a cybersecurity technology tree look like? The Comprehensive Cyber Capabilities Working Group (C3WG) sought out to build one and discovered that many gaps exist in today's frameworks. This session will unveil the first cybersecurity technology tree for data security and walk attendees through the methodology of how to build it.