Announcement

Collapse
No announcement yet.

DEF CON’s Next Top Threat Model

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • DEF CON’s Next Top Threat Model


    DEF CON’s Next Top Threat Model
    (Formerly Threat Modeling Challenge from DC27)

    Threat Modeling is arguably the single most important activity in an application security program and if performed early can identify a wide range of potential flaws before a single line of code has been written. While being so critically important there is no single correct way to perform Threat Modeling, many techniques, methodologies and/or tools exist.

    As part of our challenge we will present contestants with the exact same design and compare the outputs they produce against a number of categories in order to identify a winner and crown DEF CON’s Next Top Threat Model

    Starts
    August 6, 2021
    Ends
    August 7, 2021
    PGP key: dtangent@defcon.org valid 2020 Jan 15, to 2024 Jan 01 Fingerprint: BC5B CD9A C609 1B6B CD81 9636 D7C6 E96C FE66 156A
Working...
X