Overview
Syllabus
Intro
Disclaimers
Overuse term
Why people are nice
Software Threat Modeling
Whats not threat modeling
Threat Intel Pyramid
OAuth
Trivia
Attack Trees
Denial of Service
Fair Method
CBS
Risk Models
Likely Impact
Environment
Modeling Tool
Network Diagrams
IINS
CIS Community Attack Model
CIS Kill Chain Threat Model
Next Slide
Cybersecurity Domains
Meter Attack Matrix
How to hook it in
System Time Discovery
People Control
Ancient Aliens
Attack Matrix
Software based threading
Microsoft threat modeling
Moving to the cloud
Compliance can change
How to get shit done
Where to start
Qualitative vs Quantitative
Sample Factors
Impact
Musashi
Questions
Cyber Insurance