How to make threat modeling work for you

Robert Hurlbut offers practical strategies for threat modeling for secure software design and explains how to apply risk management to deal with the threats.

By Robert Hurlbut
June 16, 2016
Connected dots Connected dots (source: geralt via Pixabay)

This video was originally recorded in April 2016 at the O’Reilly Software Architecture Conference in New York.

Learn faster. Dig deeper. See farther.

Join the O'Reilly online learning platform. Get a free trial today and find answers on the fly, or master something new and useful.

Learn more
Post topics: Software Architecture