Description: Are the threat modeling myths keeping you from initiating this key secure design activity? Join us to get the facts; find out how easy it is to get started. We will attempt to debunk 6 recurring myths. Hopefully you will agree with us once you have a few of the facts? We aim to place participants onto a path to successful threat modeling. Please join Jim DelGrosso and Brook Schoenfield as we squash misunderstandings and industry accepted disinformation.
Jim DelGrosso
Cigital, Inc.
Senior Principal Consultant
Jim DelGrosso, Principal Consultant, has been with Cigital since 2006. In addition to his overarching knowledge of software security, he specializes in Architecture Analysis, Threat Modeling and Secure Design. In fact, he was a catalyst for creating Cigital’s current Architecture Analysis practice. Jim is also the Executive Director for IEEE Computer Society Center for Secure Design (CSD).
Are the threat modeling myths keeping you from initiating this key secure design activity? Join us to get the facts; find out how easy it is to get started. We will attempt to debunk 6 recurring myths. Hopefully you will agree with us once you have a few of the facts? We aim to place participants onto a path to successful threat modeling. Please join Jim DelGrosso and Brook Schoenfield as we squash misunderstandings and industry accepted disinformation.
For More Information Please Visit:- https://2016.appseccalifornia.org/
Tags:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.