Posted on
in Presentations
A simple goal since the dawn of software: make software resilient against threats. Add in the protection of personal information or privacy. Walk away with an understanding of how secure and privacy by design converge with threat modeling at scale, best practice tips for actionable threat modeling, and a roadmap for a successful program. Gain a practitioner's perspective on the right path forward.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community