Cart 0
The Last HOPE (2008): "Death Star Threat Modeling" (Download)

The Last HOPE (2008): "Death Star Threat Modeling" (Download)

  • 099

Friday, July 18, 2008: 11:00 am (Engressia): In the field of Information Security, the terms vulnerability, threat, and risk have specific meanings and are often misapplied and misidentified in projects. This presentation will explain threat modeling as it applies to information and application security projects, utilizing the shared memory of the Death Star trench run as an analogy to better understand these concepts. You will learn how to define risks, threats, vulnerabilities, and countermeasures; how to integrate threat modeling into a software development lifecycle; examine example threat modeling methodologies; and hear real-world anecdotes of threat modeling successes and failures.

Hosted by Kevin Williams