SECURITY RESOURCES
Offensive minded security exploit development
Slides & Presentations, VerSprite Security Resources
Attack Trees for Containers as a Service (CaaS)

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Organizational Threat Models – Atlanta Cyber Security Summit 2016

Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense

Slides & Presentations, VerSprite Security Resources
Maturing 3rd Party Vendor Risk Programs

VerSprite Security Resources, Videos, Webinars
Cyber Liability Insurance and Your Security Program – How They Fit

Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
US Company Exploring FinTech

Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
Modernizing the Telecommunications Industry

Slides & Presentations, VerSprite Security Resources
Risk Centric Threat Modeling: AppSec, Risk, Compliance Convergence | CSX North American Conference

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Healthcare Threat Modeling Vignettes

Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
HITECH /HIPAA Privacy Rule Medical Record Retention

Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Access All Private Folders

Application Security, Cloud Security, Information Security Management System (ISMS)
Command Injection in the WD My Cloud NAS

Cloud Security, VerSprite Security Resources, Videos
WD My Cloud Command Injection – Remote Root with WebRTC

Application Security, Governance Risk & Compliance, Information Security Management System (ISMS), Regulatory Compliance
Anti-Nausea Medicine for LastPass, Password Management FUD

Application Security, Threat Modeling
Why Threat-Free Threat Modeling Doesn’t Work

Subscribe for Our
Updates
Please enter your email address and receive the latest updates