Learn about tapping the power of various inherent cloud monitoring and log components in order to build a dynamic threat library that can substantiate your threat model.
Take a deeper look into Azure and AWS components and how to leverage both when adding threat context and ultimately an amazing threat library to your application threat model.
Lastly, you will learn how to exemplifying these techniques across mission critical infrastructure in Energy and Transportation.
Learn how to build a valid threat library: