Learn how you can use attack trees for security risk assessments.

First Name
Last Name
Company Name
Opt-in To Future Emails
Thank you!
Error - something went wrong!

Research Perspectives on Lightweight Security Risk Assessments Using Attack Trees

July 28, 2020

Offensive security techniques help us to identify gaps in a system’s architecture. To be useful, we believe attack trees must be contextual and account for business risk. They must also scale without introducing unnecessary overhead in the generation of attack scenarios, false positives, and asset risk alignment.

In this webinar, we have shared some of our ongoing research in automating attack trees for security control generation. We will extend this conversation to the practical side by exploring specific use cases and projecting possible ways to filter attack trees at scale.

Previous Video
Balancing DevOps Speed and Business Risk
Balancing DevOps Speed and Business Risk

The focus on software delivery speed has created gaps in security which can be disastrous for a business. L...

Next Video
Evolving Threat Modeling to Fit DevOps
Evolving Threat Modeling to Fit DevOps

Traditional threat modeling approaches don’t fit easily in today's fast-moving DevOps pipelines. Is there a...