BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:cebecd67-e157-49f3-babf-c59eb5a7b585
DTSTAMP:20260522T152831Z
SUMMARY:DEF CON’s Next Top Threat Model
DESCRIPTION:DEF CON’s Next Top Threat Model\n  \n(Formerly Threat Modelin
 g Challenge from DC27)\n \nThreat Modeling is arguably the single most imp
 ortant activity in an application security program and if performed early 
 can identify a wide range of potential flaws before a single line of code 
 has been written. While being so critically important there is no single c
 orrect way to perform Threat Modeling\, many techniques\, methodologies an
 d/or tools exist. \n\nAs part of our challenge we will present contestants
  with the exact same design and compare the outputs they produce against a
  number of categories in order to identify a winner and crown DEF CON’s 
 Next Top Threat Model
URL:https://forum.defcon.org/node/236501
DTSTART;VALUE=DATE:20210806
DTEND;VALUE=DATE:20210808
END:VEVENT
END:VCALENDAR
