Threat Modeling Privacy


Posted on in Presentations

This session will include a hands-on exercise that will help participants identify potential security and privacy threats and design and implement privacy enhancing technologies (PETs). A further exercise will focus on creation and use of context diagrams to first identify data flows and consumers of data, and then to determine threats, vulnerabilities and risks.

Pre-Requisites: Foundational understanding of data privacy is helpful, but not required.
Participants
Jason Cronk

Participant

Privacy and Trust Consultant, Enterprivacy Consulting Group

Jonathan Fox

Participant

Director, Privacy Engineering, Cisco

Denise Schoeneich

Participant

Privacy Engineer, Intel Corporation


Share With Your Community