Threat Modeling: Employing the 5Ws Public

In the early days of networked computing, security was an afterthought for most vendors, system administrators and developers alike. Security features were often implemented haphazardly to mitigate discovered vulnerabilities. This is an expensive and reactive process. Threat modeling is a proactive approach for identifying and mitigating security threats across the lifecycle of an IT service, from design through end of life. In this session, we will navigate threat modeling utilizing the 5 W’s: who, what, when, where, why to foster and develop critical thinking skills to protect our hardware, software and data assets. Attendees will learn how to: Apply basic threat modeling Identify assets to protect, areas of risk, threats, and potential methods of mitigation Request relevant application and penetration testing suites and services offered by SOS

README

Collections

This Work is not currently in any collections.

Items in this Work

User Activity Date