SECURITY RESOURCES
Offensive minded security exploit development
VerSprite Security Resources
Risk Centric Application Threat Modeling | NYC OWASP 2016
Possible Use Cases, VerSprite Security Resources
Hospitality Client Hoping to Avoid Controversy
VerSprite Security Resources
Assessing a Potential Mining Project Partner
Slides & Presentations, VerSprite Security Resources
Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016
Slides & Presentations, VerSprite Security Resources
Attack Trees for Containers as a Service (CaaS)
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Organizational Threat Models – Atlanta Cyber Security Summit 2016
Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense
Slides & Presentations, VerSprite Security Resources
Maturing 3rd Party Vendor Risk Programs
VerSprite Security Resources, Videos, Webinars
Cyber Liability Insurance and Your Security Program – How They Fit
Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
US Company Exploring FinTech
Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
Modernizing the Telecommunications Industry
Slides & Presentations, VerSprite Security Resources
Risk Centric Threat Modeling: AppSec, Risk, Compliance Convergence | CSX North American Conference
Slides & Presentations, Threat Modeling, VerSprite Security Resources
Healthcare Threat Modeling Vignettes
Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Medical Record Retention Across States (HIPAA / HITECH)
Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Access All Private Folders
Subscribe for Our
Updates
Please enter your email address and receive the latest updates