Threat Modeling Demystified

Threat Modeling Demystified (RSA Conference 2017)

Most organizations require threat models. The industry has recommended threat modeling for years. What holds us back? Master security architect, author and teacher Brook Schoenfield will take participants through a threat model experience based upon years of teaching. Expect a kick start. Practitioners will increase understanding. Experts will gain insight for teaching and programs.

Detailed Presentation :

(Source : RSA USA 2017)

Speaker:

Brook S.E.Schoenfield

Brook S.E. Schoenfield is the Author of Securing Systems: Applied Security Architecture and Threat Models(CRC Press, 2015). He is the Principal Architect for product security at Intel Security Group. He provides strategic technical leadership, training and mentoring for 75 security architects. He is a founding member of IEEE’s Center for Secure Design and is a featured security architect at the Bletchley Park Museum of Computing. He is the originator of Baseline Application Vulnerability Assessment (BAVA), Just Good Enough Risk Rating (JGERR), Architecture, Threats, Attack Surfaces, and Mitigations (ATASM) and developer-centric security. He contributed to Core Software Security (CRC Press, 2014), and co-authored “Avoiding the Top 10 Security Design Flaws” (IEEE, 2014).

8669813678?profile=original

Pre Register For SACON -  India's First Security Architecture Conference

Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in November 2017. Pre-Register and get special discount access and talk highlights.

>>Click Here To Pre Register & Avail Special Discounts

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)