Scoping and Data Gathering in Threat Modeling

Logo
Presented by

Taylor Armerding, Security Advocate | Chris Cummings, Principal Consultant

About this talk

Learn how to handle scoping and data gathering, two of five necessary steps in creating a useful threat modeling.

Related topics:

More from this channel

Upcoming talks (17)
On-demand talks (155)
Subscribers (49045)
Synopsys Software Integrity Group provides integrated solutions that transform the way development teams build and deliver software, accelerating innovation while addressing business risk. Our industry-leading portfolio of software security products and services is the most comprehensive in the world and interoperates with third-party and open source tools, allowing organizations to leverage existing investments to build the security program that’s best for them. Only Synopsys offers everything you need to build trust in your software.