Threat Modeling Courses
Hack In The Box Security Conference via YouTube How Threat Modeling Can Influence ICS Security Posture
Kaspersky via YouTube CANnon - Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers
IEEE via YouTube Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube Helen - Maliciously Secure Coopetitive Learning for Linear Models
IEEE via YouTube fTPM - A Software-Only Implementation of a TPM Chip
USENIX via YouTube Command and KubeCTL - Real-World Kubernetes Security for Pentesters
0xdade via YouTube Resistance Isn't Futile - A Practical Approach to Prioritizing Defenses with Threat Modeling
0xdade via YouTube Looking for Malicious Hardware Implants with Minimal Equipment
0xdade via YouTube Ghost DMA Attack & The SeDeFuS Conundrum
BSidesLV via YouTube