The Fastest Way to Become a Backend Developer Online
Finance Certifications Goldman Sachs & Amazon Teams Trust
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore enterprise-class threat management strategies in this 54-minute conference talk from Converge 2016. Delve into critical data architecture, security frameworks, and application security verification standards. Learn about encryption, threat prioritization, and incident metrics. Discover practical threat modeling techniques, incident response templates, and identity management approaches. Gain insights into enterprise security architecture through a comprehensive demo and real-world examples. Equip yourself with valuable references to enhance your organization's threat management capabilities.
Syllabus
Intro
Recap
Critical Data
Architecture
Framework
Security Architecture
Challenges
Threat Management Goals
Application Security Verification Standard
Level 1 ASDS Framework
Level 2 ASDS Framework
Encryption
Threat Prioritization
Threat Multipliers
Incident Metrics
Compromise Metrics
Threat Models
Threat Modeling For Reals
Incident Response Template
Incident Lexicon
Demo
Threat Prioritization Example
Identity Management
Enterprise Security Architecture
References