Posted on
in Presentations
A simple goal since the dawn of software: make software resilient against threats. Add in the protection of personal information or privacy. Walk away with an understanding of how secure and privacy by design converge with threat modeling at scale, best practice tips for actionable threat modeling, and a roadmap for a successful program. Gain a practitioner's perspective on the right path forward.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community