What Happens to Your Threat Model When Hardware Isn’t Really Hardware?

Posted on in Presentations

Join for a discussion about hardware and software update cycles and the importance of reconsidering the way we think about hardware security. We will also discuss the significance of making hardware and software more secure and resilient, and Intel’s commitment to developing technologies to solve the industry’s most complex problems.

Learning Objectives:
1: Understand modern threat modeling.
2: Understand the role of hardware in securing the computing stack.
3: Learn about the importance of adopting newer mitigations.

Attendees should have general experience in threat modeling, SDL and incident response.

Lorie Wigle


Vice President, GM, Intel Corporation

Security Strategy & Architecture

security intelligence governance risk & compliance exploit of vulnerability cloud security business continuity & disaster recovery



Share With Your Community