Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Threat modeling: Kill chains, diamond models, and the 50-yard line

‎08-20-2014 12:42 PM - edited ‎06-05-2015 01:57 PM

Some technology concepts grow slowly and steadily, while others, like threat modeling, seem to proliferate and mutate as if they fed on air. Threat modeling, as a whole, isn’t new—we all know that it’s impossible to design a secure system until you understand the threats to it. In other words, you need to understand the bad guy: What weaknesses the adversary sees, and how he might exploit the system.

 

 

The perfect opportunity to do this? HP Protect. September 8-11th, the very best in security will descend upon D.C. to talk shop. It’s here, in Business Breakout 3173, “Threat modeling: Kill chains, diamond models, and the 50-yard line,” that you’ll have the opportunity to gain a bird’s-eye view of current threat-modeling theories, hear a survey of the landscape, and learn to assess which approaches work best for your business.

 

Join us! Click here to register, and visit the following link to see the entire session catalog from which you can build your agenda!  

 

We’re looking forward to seeing you at HP Protect!

0 Kudos
About the Author

StephanieWisdom

Events
Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference on August 29 - September 1, 2016 to learn from peers in every industry and hear from Big Data experts and thought lea...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference on September 13 - 16, 2016, and is the place to meet the world’s top information security talent, discuss new pr...
Read more
View all