Threat Modeling: How Do You Define It? How Do You Use It?

  • Thursday, February 27, 2014 | 9:20 AM – 10:20 AM | West | Room: 2021

View all Sessions

There are many different approaches to threat modeling: methodologies, visual attack graphs, red teaming, security in the SDLC and more. The aim of this discussion is to understand the types of threat models in use; to categorize them and discuss when the different types of models are appropriate; and to brainstorm potential future work in creating better and more standardized threat models.


This document was retrieved from on Fri, 27 Nov 2015 05:02:49 -0500.
© 2015 EMC Corporation. All rights reserved.