|By:||John Lightsey (J.D.) from Houston.pm|
|Date:||Not scheduled yet.|
This talk will discuss techniques for extending the application threat modeling process to include privacy modeling. We'll walk through the process of creating a threat model for a software system, using it to enumerate potential security issues, and reuse the threat model to discover potential privacy issues.