Building Privacy In

By: John Lightsey (‎J.D.‎) from
Date: Thursday, 16 August 2018 11:30
Duration: 50 minutes
Target audience: Any
Language: English
Tags: analysis design gdpr privacy security

This talk will discuss techniques for extending the application threat modeling process to include privacy modeling. We'll walk through the process of creating a threat model for a software system, using it to enumerate potential security issues, and reuse the threat model to discover potential privacy issues.

Attended by: Leon Timmermans (‎leont‎), Lee Johnson, Erik Huelsmann, Gianni Ceccarelli (‎dakkar‎), Tom Hukins, John Lightsey (‎J.D.‎), Diego Kuperman (‎diegok‎), Dagfinn Ilmari MannsÃ¥ker (‎ilmari‎), Aaron Rowe, Peter Mottram (‎SysPete‎), Choroba, Kivanc Yazan, Tori, Ilya Chesnokov (‎ichesnokov‎), Eitan Schuler, Sorin Pop (‎finger‎), Phil King, Wesley Schwengle (‎waterkip‎), Jon André Hjellestad (‎Jonis‎), Nicholas Clark, Todd Rinaldo (‎toddr‎), Gregor Goldbach (‎glauschwuffel‎), Richard van Lochem (‎rvlochem‎), Theo van Hoesel (‎vanHoesel‎), Martin Barth (‎ufobat‎), Jean-Baptiste Mazon, atoomic, Matthew Chubb (‎mchubb‎), raiph, Johan Lindstrom, Maria Hedberg, Aaron Crane (‎arc‎), Dan Muey, Dave Sherohman (‎dsheroh‎), J. Nick Koston (‎bdraco‎), Kang-min Liu (‎gugod‎), Andrew Nugged (nugged), Andreas Boesen (‎Happy‎), Andreas Huber, Andrew Solomon (‎illy‎), Jean Forget, Jan Seidl (‎JaSei‎), Mischa Schwieger, Barbie, Richard Newsham (‎rnewsham‎)

Community Sponsors

Enlightened Perl Organisation Magnum Solutions Logo Perl6 Community Perl Weekly