| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
That hasn't happened here! No one would do that! We don't have time to deal with that! Maybe. Maybe not. Steve will use threat modeling to peel back the onion on a few threat scenarios involving unicorns and jerks. And he'll explain how this practice will help uncover other risks and control gaps for threat scenarios which are [seemingly] more likely. And since fingers will be pointed when the unicorns and jerks do materialize, he'll explain how socializing your queue of unicorns and jerks can pay dividends when they come knocking. Steve Werby is a [father|husband|hacker|strategist|architect|former CISO].
Steve Werby does not [have orange hair|use a real signature].
Steve Werby is not a [thought leader|rock star|guru].
Steve Werby likes [patterns|craft beer|risk].
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast