Threat Modeling Privacy


Posted on in Presentations

This session will include a hands-on exercise that will help participants identify potential security and privacy threats and design and implement privacy enhancing technologies (PETs). A further exercise will focus on creation and use of context diagrams to first identify data flows and consumers of data, and then to determine threats, vulnerabilities and risks.

Pre-Requisites: Foundational understanding of data privacy is helpful, but not required.

Interested? We have you covered! This popular session will also be streamed live in The Session Viewing Point, West Level 2 Room 2004.

Participants
Denise Schoeneich

Participant

Privacy Engineer, Intel Corporation

Jason Cronk

Participant

Privacy and Trust Consultant, Enterprivacy Consulting Group

Jonathan Fox

Participant

Director, Privacy Engineering, Cisco

Protecting Data & the Supply Chain Ecosystem Privacy

risk & vulnerability assessment privacy PII GDPR ethics


Topic

Subtopic


Share With Your Community