Thank You!
View Presentation & Link to Download PDF Below
Building Valid Threat Libraries for Cloud Based Applications
Substantiating Threat Models with Threat Data
At VerSprite, we approach security from a holistic risk management perspective, understanding security from business and attacker perspectives. Our approach goes beyond assessing security controls, and examines credible threats to understand the likelihood of a real-world abuse case, and measuring the magnitude of business impact if a breach should occur. By developing a holistic business/IT risk view, security decisions become business decisions.