Diagram It: IoT
Wednesday, April 24, 2024
11:00-11:30AM ET/ 16:00 GMT/17:00 CET
In this session, we’ll examine multiple distinct representations of IoT within threat models. Through comparative analysis, the strengths and weaknesses of each approach are scrutinized, facilitating informed decision-making in threat modeling processes.
Diagram It: IoT
In this session, we’ll examine multiple distinct representations of IoT within threat models. Through comparative analysis, the strengths and weaknesses of each approach are scrutinized, facilitating informed decision-making in threat modeling processes.
Presenters
James Rabe
Global Technical Program Manager, IriusRisk
Key Takeaways
Best practices for scoping and diagramming representations
Methodologies for effectively representing SSO systems
Understanding the impact on the value of threat models