Threat Modeling: How Do You Define It? How Do You Use It?

  • Thursday, February 27, 2014 | 9:20 AM – 10:20 AM | West | Room: 2021
View all Sessions

There are many different approaches to threat modeling: methodologies, visual attack graphs, red teaming, security in the SDLC and more. The aim of this discussion is to understand the types of threat models in use; to categorize them and discuss when the different types of models are appropriate; and to brainstorm potential future work in creating better and more standardized threat models.

Participants

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions/1243/threat-modeling-how-do-you-define-it-how-do-you-use on Sat, 25 Oct 2014 15:40:11 -0400.
© 2014 EMC Corporation. All rights reserved.