layout | title |
---|---|
default |
Threat Modeling |
In this session we'll talk about threat modeling, a process to determine which threats are important to an application and find points where defenses might be lacking.
- "Heavy-weight" threat modeling
- How to do it
- Why it isn't a good fit for bug bounty hunters
- Light-weight threat modeling
- How to do it
- Why it's simple and effective
<iframe id="ytplayer" type="text/html" width="640" height="360" src="https://www.youtube-nocookie.com/embed/6DI7RIXUTg8?rel=0&autoplay=0&origin={{ site.url }}" frameborder="0"></iframe>