How to Identify Threat Modeling Limitations

Hosted By
Steve P.

Details
Many cyber and application security tools love to say they can do everything needed to protect your assets. It isn’t rocket science to know that’s not true. It’s helpful to consider the limitations of tools and processes. This presentation will take attendees through how to define the limitations of threat modeling correctly, understand best practices in how, when, and by whom a proper threat model should be performed, and how this process of identifying threat model limitations can help users better understand its utility to systems and processes.

OWASP Triangle Chapter
See more events
Online event
This event has passed
How to Identify Threat Modeling Limitations