Overview
Explore how online dating experiences can enhance threat modeling skills in this 43-minute conference talk from BSides Columbus 2019. Discover the parallels between personal security in dating and professional cybersecurity practices. Learn about data flow diagrams, security nihilism, and the importance of understanding where data comes from. Gain insights into offensive attacks, data breaches, and location control. Examine the concept of risk versus reward in both dating and cybersecurity contexts. Understand how to apply threat modeling techniques to improve overall security awareness and decision-making in various aspects of life.
Syllabus
Intro
Who this talk is for
Why this topic
Security nihilism
Data flow diagram
Purposes
Action
Stripe Protect
Checkmarks
Checkmarks Vulnerability
Factories
Offensive Attacks
Data Breaches
Location Control
Hardware
Introduction to Threat Modeling
Where is data coming from
Red Teams
Choose What You Share
Risk vs Reward