Using Threat Modeling to Improve Enterprise Cyber Defenses

As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize how to fix them. In this webinar, experts discuss how to define security requirements, pinpoint and quantify potential vulnerabilities, and prioritize remediation methods. Learn how to conduct a threat modeling exercise and make risk-based decisions to strengthen your organization’s security.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Be better prepared to use threat modeling and risk analysis to customize your own security strategy.
  • Create a richer, more sophisticated threat model that reduces risk and keeps your data and users more safe.
  • Uncover new vulnerabilities that may were less evident or may have been laying dormant.
  • Increase the effectiveness of your remediation efforts by establishing new, strategic priorities for your organization.

Featured Speakers

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Yaniv Bar-Dayan
    Yaniv Bar-Dayan
    CEO and Co-Founder
    Vulcan Cyber

    Yaniv has spent more than a decade helping some of the largest companies in the world improve cyber security and reduce risk. With his “solutions, not problems” mantra, Yaniv co-founded Vulcan Cyber to help cyber security and IT teams collaborate and scale operations to drive cyber hygiene outcomes and reduce business risk. Vulcan Cyber exists to help business orchestrate and automate risk remediation for application, infrastructure and cloud security programs to ultimately get fixes done.

  • Terry Sweeney
    Terry Sweeney
    Moderator
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World, SearchAWS.com, and Stadium Tech Report.

Sponsored By