A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Adopting a Risk-based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data - Todd Bursch GrrCON 2014 (Hacking Illustrated Series InfoSec Tutorial Videos)

Adopting a Risk-based Threat Model to Secure Your Defenses and Regain Control of Your Critical Data
Todd Bursch
GrrCON 2014

Due to increasingly complex attack and evasion techniques being used by sophisticated hackers, Perimeter and Infrastructure-based security programs no longer serve the dynamic security needs of organizations. A risk-based threat model can enable you to regain control of your critical data regardless of where it resides, and empower your workforce with access to information without compromising your IP and other critical data. Creating a security program focused on risk-based evaluation of threats can assist IT security in meeting evolving critical data security demands while enabling business groups and the overall success of an organization.

Back to GrrCON 2014 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast