Threat Modeling Privacy

Posted on in Presentations

This session will include a hands-on exercise that will help participants identify potential security and privacy threats and design and implement privacy enhancing technologies (PETs). A further exercise will focus on creation and use of context diagrams to first identify data flows and consumers of data, and then to determine threats, vulnerabilities and risks.

Pre-Requisites: Foundational understanding of data privacy is helpful, but not required.
Jason Cronk


Privacy and Trust Consultant, Enterprivacy Consulting Group

Jonathan Fox


Director, Privacy Engineering, Cisco

Denise Schoeneich


Privacy Engineer, Intel Corporation

Share With Your Community