Description: Ushering in the Post-GRC World: Applied Threat Modeling
Risk management at a systemic level is complicated enough that many organizations deem it practically impossible. Yet constructing and applying risk and threat models appropriately is the cornerstone for any successful security program; since they focus energy on 1) what needs to be protected and 2) how much investment is needed. In this talk Alex Hutton and Allison Miller will show how risk models can be translated from the white-board to implementation.
Tags: securitytube , Confidence , hacking , hackers , information security , convention , computer security , blackhat10 , blackhat-2010 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.