SECURITY RESOURCES
Offensive minded security exploit development
Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications

Application Security, Governance Risk & Compliance, Information Security Management System (ISMS)
SSL/TLS Security – A Simplified, Quick Guide

VerSprite Security Resources
Risk-Centric Application Threat Models

Threat & Vulnerability Management
Unknown jQuery-File-Upload Vulnerability Used for Years

VerSprite Security Resources
Risk Centric Application Threat Modeling | NYC OWASP 2016

Possible Use Cases, VerSprite Security Resources
Hospitality Client Hoping to Avoid Controversy

VerSprite Security Resources
Assessing a Potential Mining Project Partner

Slides & Presentations, VerSprite Security Resources
Attack Trees Vignettes for Containers as a Service (CaaS) – AppSec EU 2016

Slides & Presentations, VerSprite Security Resources
Attack Trees for Containers as a Service (CaaS)

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Organizational Threat Models – Atlanta Cyber Security Summit 2016

Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense

Slides & Presentations, VerSprite Security Resources
Maturing 3rd Party Vendor Risk Programs

VerSprite Security Resources, Videos, Webinars
Cyber Liability Insurance and Your Security Program – How They Fit

Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
US Company Exploring FinTech

Geopolitical Risk, Possible Use Cases, VerSprite Security Resources
Modernizing the Telecommunications Industry

Subscribe for Our
Updates
Please enter your email address and receive the latest updates