These two sessions will go over the most prominent DLOM methods, when they should be applied, and how to apply them. Part 1 (a rebroadcast with live Q&A) focuses on benchmark study approaches and security-based approaches. Part 2 (live) discusses the analytical approaches and includes an in-depth case study.
Please let us know
if you have any comments about this article or enhancements you would like to see.