Threat Modeling Privacy


Posted on in Presentations

This session will include a hands-on exercise that will help participants identify potential security and privacy threats and design and implement privacy enhancing technologies (PETs). A further exercise will focus on creation and use of context diagrams to first identify data flows and consumers of data, and then to determine threats, vulnerabilities and risks.

Pre-Requisites: Foundational understanding of data privacy is helpful, but not required.

Participants
Denise Schoeneich

Privacy Engineer, Intel Corporation

Jason Cronk

Privacy and Trust Consultant, Enterprivacy Consulting Group

Jonathan Fox

Director, Privacy Engineering, Cisco

Protecting Data & the Supply Chain Ecosystem Privacy

risk vulnerability assessment privacy PII GDPR ethics


Topic

Subtopic


Share With Your Community