ePrivacy and GPDR Cookie Consent by Cookie Consent
Threat Models as Blueprints for Security Offense-Defense: Presentation by Tony UcedaVélez, Versprite – Digitalmunition




Videos Threat Models as Blueprints for Security Offense-Defense: Presentation by Tony UcedaVélez, Versprite

Published on August 9th, 2019 📆 | 8376 Views ⚑

0

Threat Models as Blueprints for Security Offense-Defense: Presentation by Tony UcedaVélez, Versprite



Modeling for threats forces an adversarial lens for security operations team members. Via evidence backed attack simulations, security operations centers (SOC) can define a blueprint for defense that factors in motives, related attack patterns, and realistic targets. Threat modeling provides a fluid plan for which intelligence sources and threat data can support a more strategic SOC versus the many that are only driven by tool based alerts. Similarly, threat modeling can provide exceptional adversarial exercises meant to emulate attack patterns that reflect realistic threat motives, Many penetration tests today are driven by results from tools – particularly vulnerability results from tools. Vulnerabilities can cloud the objectives of white hats, but they do not cloud the strategy from true cyber criminals.

As CREST continues to evolve more rigorous standards for penetration testing, these activities can be combined with a risk centric threat modeling methodology to apply greater strategy to both defensive and offensive security measures. Watch the video to learn how to use VerSprite’s risk-centric threat modeling methodology to apply greater strategy to both defensive and offensive security measures.

https://www.crest-approved.org/
https://twitter.com/crestadvocate
https://www.linkedin.com/company/crest-approved/


2019-08-09 13:13:34

source

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...