Healthcare Threat Modeling Vignettes - ISC²/ASIS Security Conference Healthcare Threat Modeling Vignettes - ISC²/ASIS Security Conference

Home  |  Resources  |  Healthcare

Healthcare Threat Modeling Vignettes

Written By: Versprite

< Back to Blog Home

Security Threats in Healthcare

This presentation discusses healthcare threat modeling with risk-centric approaches, which took place at ISC²/ASIS International 2015 Security Conference in Anaheim, CA on Monday, September 28, 2015. To learn more about healthcare security, learn how VerSprite can assist here.

PASTA Threat Modeling

Risk Centric Threat Modeling:
Process for Attack Simulation and Threat Analysis

VerSprite leverages our PASTA (Process for Attack Simulation & Threat Analysis) methodology to apply a risk-based approach to threat modeling. This methodology integrates business impact, inherent application risk, trust boundaries amongst application components, correlated threats, and attack patterns that exploit identified weaknesses from the threat modeling exercises. Get the Guide →

We are an international squad of professionals working as one.

logos