What's in Your Top Ten - Intelligent Application Security Prioritization
Offered By: YouTube
Course Description
Overview
Explore a pragmatic approach to threat modeling in application security with this 47-minute conference talk from GrrCon 2016. Learn why threat modeling is crucial, understand the challenges preventing its widespread adoption, and discover a practical methodology for implementing it effectively. Delve into architecture-driven threat modeling, its integration with the software development lifecycle, and how it enhances security testing and prioritization. Gain insights on simplifying the process to ensure its sustainability and impact on overall application security.
Syllabus
Intro
Introductions
Why Do We (or should we) Threat Model
So Why Don't We Threat Model?
Ideal Threat Modeling
A Pragmatic Approach
Architecture/Design Driven
The Methodology
Ensuring All Is Not Lost
Feeding the SDLC
Improve Security Testing
Enable Security Prioritization
Keep It Simple Stupid
Related Courses
MongoDB for .NET DevelopersMongoDB University Web Application Development – Capstone Course
University of New Mexico via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera