Tags: analysis design gdpr privacy security
This talk will discuss techniques for extending the application threat modeling process to include privacy modeling. We'll walk through the process of creating a threat model for a software system, using it to enumerate potential security issues, and reuse the threat model to discover potential privacy issues.
Attended by: Leon Timmermans (leont),
Lee Johnson,
Erik Huelsmann,
Gianni Ceccarelli (dakkar),
Tom Hukins,
John Lightsey (J.D.),
Diego Kuperman (diegok),
Dagfinn Ilmari Mannsåker (ilmari),
Aaron Rowe,
Peter Mottram (SysPete),
Choroba,
Kivanc Yazan,
Tori,
Ilya Chesnokov (ichesnokov),
Eitan Schuler,
Sorin Pop (finger),
Phil King,
Wesley Schwengle (waterkip),
Jon André Hjellestad (Jonis),
Nicholas Clark,
Todd Rinaldo (toddr),
Gregor Goldbach (glauschwuffel),
Richard van Lochem (rvlochem),
Theo van Hoesel (vanHoesel),
Martin Barth (ufobat),
Jean-Baptiste Mazon,
atoomic,
Matthew Chubb (mchubb),
raiph,
Johan Lindstrom,
Maria Hedberg,
Aaron Crane (arc),
Dan Muey,
Dave Sherohman (dsheroh),
J. Nick Koston (bdraco),
Kang-min Liu (gugod),
Andrew Nugged (nugged),
Andreas Boesen (Happy),
Andreas Huber,
Andrew Solomon (illy),
Jean Forget,
Jan Seidl (JaSei),
Mischa Schwieger,
Barbie,
Richard Newsham (rnewsham)