Layering Threat Models to Drive Zero Trust Policies and Solutions


Posted on in Presentations

Organizations need a source of truth for logical and physical topology of their application architectures to map transaction flows for their Zero Trust protect surface, but, limited design patterns exist to collect and capture data flow diagrams and security architectures at scale. Consider how technology captures and layered threat models can drive downstream Zero Trust workflows.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Brenna Leath

Speaker

Principal, Software Security , Navy Federal Credit Union


Share With Your Community