Threat Modeling: How Do You Define It? How Do You Use It?

  • Thursday, February 27, 2014 | 9:20 AM – 10:20 AM | West | Room: 2021

View all Sessions

There are many different approaches to threat modeling: methodologies, visual attack graphs, red teaming, security in the SDLC and more. The aim of this discussion is to understand the types of threat models in use; to categorize them and discuss when the different types of models are appropriate; and to brainstorm potential future work in creating better and more standardized threat models.


This document was retrieved from on Thu, 27 Oct 2016 08:49:08 -0400.
© 2016 EMC Corporation. All rights reserved.