Overview
Syllabus
Intro
Fast facts about me...
Ask the Experts: What is threat modeling?
Threat Modeling for (Secure) Development
Threat Modeling for Individuals
Threat Modeling (for Devices and Users)
Below the OS: Pre-boot and Runtime
[Shark] Attack: "Advanced" Device-targeted TH
Persistent Threats in Firmware
Physical Access to User Devices
Supply Chain and Insider Threats
Sidebar: Supply Chain Complexity... Simplified
Building a Long-term Strategic Threat Model
Overview: "Below the OS" Mitigations Today
Potential Mitigations
Example Implementation: Dell SafeBIOS Frame RESPOND
Taught by
RSA Conference