Most Recent Videos
Technology threat landscapes change rapidly, enterprises realize the value of integrating threat modeling with DevSecOps to protect systems better without hindering the speed brought about by DevOps.
Significantly reduce vulnerabilities by developing software with SD Elements.
Join us as we discuss the key concepts and components of a cATO architecture and walk through a use case of how the implementation works.
Jeremy Ferragamo and Kalyan (B.K.) Bandaru, FINRA
Chris Riley, Splunk Inc.
Brian Pitts, Johnson Controls
Dan Fritsche - Alpine Security, Shaifaly Chaudhary - Security Compass
Matthew Bohne, Honeywell
Arun Prabhakar - Security Compass, Jack Freund - VisibleRisk, Altaz Valani - Security Compass, Simone Curzi - Microsoft, Hasan Yasar - Carnegie Melon University
Purnima Bihari & Arun Prabhakar, Security Compass
Trevor Young & Mrunmayee Athawale, Security Compass
presented by: Brandon Triance-Haldane, Security Compass
Le Yen Lam & Jordan Haine - Security Compass
Bob Aiello, CM Best Practices Consulting
Rob Cuddy - HCL Technologies, Jack Freund - VisibleRisk, Paul Bruce - Tricentis, Vicky Hailey - The Victoria Hailey Group, Vishal Asthana - U.S. Bank & Altaz Valani - Security Compass
U.S. federal government agencies are under constant pressure to modernize their IT systems and consistently deliver applications faster.
View our panel discussion as we discuss how threat modeling is evolving into a multi-stakeholder activity that suggests mitigations on an ongoing basis to drive down risk for critical business assets.