Threat Modeling over Coffee: A simple method of Data Prioritization

Logo
Presented by

Molly Payne, Recovering Threat Hunter, MSSP SOC Manager at Raytheon

About this talk

Software and Data systems in most people’s companies are complicated and tend to grow organically. This organic growth can make it difficult to know what/where/how your assets need protecting. Come join me for a cup of coffee while I share the strategies I use through stories from the field on how to help you threat model your environment and take a proactive step to breach protection. Problem to be Solved: How do I know what to protect? Solution: Have coffee with your managers and use three simple question to threat model the assets they control. Delivery: Sharing three stories from my work as a SOC manager, Analyst and Threat Hunter as examples of why to threat model, and how easy it can be. The Stories: 1. The case of the lost donor list. a. Third Party Vendor Compromise 2. What does the FBI and Web shells have in common?You. a. Unpatched Servers. 3. What was stolen? a. Ransomware and mystery assets.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198860)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.