This session aims to gently introduce graph theory and the applied use of graphs for people who, like the speaker, consider themselves lacking the often perceived advanced math, science and computer programming knowledge needed to harness their power. The applied use of graphs will be discussed to help attendees track security threats, build attacker profiles and better understand organizational risk based on introducing new tools, processes or legal requirements.
Attendees may not leave with a Ph.D., but they’ll certainly walk away with a firmer understanding of graph theory and how to construct, deploy and maintain graphs for security and compliance initiatives within their organization.
Learning Objectives:
- Have a firm understanding of graph theory and the applied use of graphs for security tasks
- Track security threats, construct attacker profiles and use graphs to better understand organizational risk
- Walk away with a firmer understanding of graph theory and how to construct, deploy and maintain graphs for security and compliance initiatives within their organization