Diagram It: IoT

Wednesday, April 24, 2024
11:00-11:30AM ET/ 16:00 GMT/17:00 CET
In this session, we’ll examine multiple distinct representations of IoT within threat models. Through comparative analysis, the strengths and weaknesses of each approach are scrutinized, facilitating informed decision-making in threat modeling processes.

Diagram It: IoT

In this session, we’ll examine multiple distinct representations of IoT within threat models. Through comparative analysis, the strengths and weaknesses of each approach are scrutinized, facilitating informed decision-making in threat modeling processes.

Presenters
James Rabe
Global Technical Program Manager, IriusRisk

Key Takeaways

Best practices for scoping and diagramming representations
Methodologies for effectively representing SSO systems
Understanding the impact on the value of threat models