Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Threat modeling: Kill chains, diamond models, and the 50-yard line

‎08-20-2014 12:42 PM - edited ‎06-05-2015 01:57 PM

Some technology concepts grow slowly and steadily, while others, like threat modeling, seem to proliferate and mutate as if they fed on air. Threat modeling, as a whole, isn’t new—we all know that it’s impossible to design a secure system until you understand the threats to it. In other words, you need to understand the bad guy: What weaknesses the adversary sees, and how he might exploit the system.

 

 

The perfect opportunity to do this? HP Protect. September 8-11th, the very best in security will descend upon D.C. to talk shop. It’s here, in Business Breakout 3173, “Threat modeling: Kill chains, diamond models, and the 50-yard line,” that you’ll have the opportunity to gain a bird’s-eye view of current threat-modeling theories, hear a survey of the landscape, and learn to assess which approaches work best for your business.

 

Join us! Click here to register, and visit the following link to see the entire session catalog from which you can build your agenda!  

 

We’re looking forward to seeing you at HP Protect!

0 Kudos
About the Author

StephanieWisdom

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Events
Jun 7-9
Las Vegas
Discover 2016 Las Vegas
Discover 2016 in Las Vegas, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference and is the place to meet the world’s top information security talent, discuss new products and share information...
Read more
View all