BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:167fb1b1-58cb-45a5-a8c8-b15dde805498
DTSTAMP:20260425T164534Z
SUMMARY:DC’s Next Top Threat Model (DCNTTM)\, Saturday 10:00-18:00
DESCRIPTION:..\n..\nDC’s Next Top Threat Model (DCNTTM)\nFriday: 10:00-18
 :00\nSaturday: 10:00-18:00\nDEF CON Contest Area\, Forum Ballroom | Hybrid
  |\n\nTwitter: @ThreatModelUs (https://twitter.com/ThreatModelUs)\n\nThrea
 t Modeling is arguably the single most important activity in an applicatio
 n security program and if performed early can identify a wide range of pot
 ential flaws before a single line of code has been written. While being so
  critically important there is no single correct way to perform Threat Mod
 eling\, many techniques\, methodologies and/or tools exist.\n\nAs part of 
 our challenge we will present contestants with the exact same design and c
 ompare the outputs they produce against a number of categories in order to
  identify a winner and crown DEF CON’s Next Top Threat Model(er).​​
URL:https://forum.defcon.org/node/245263
DTSTART:20230812T180000Z
DTEND:20230813T020001Z
LOCATION:DEF CON Contest Area\, Forum Ballroom
END:VEVENT
END:VCALENDAR
