Track: | Threat Model |
---|---|
When: | Thu AM-1 |
Where: | Kings |
Organizers | Steven Wierckx Steven Wierckx |
Participants | Fraser Scott Fraser Scott , Peter Turczak Peter Turczak , Stephanie Vanroelen Stephanie Vanroelen , Stuart Winter-Tear Stuart Winter-Tear , Tash Norris Tash Norris |
Why
We all love Cheat Sheets. They are great to use when you need it but they are also great to learn because they force us to summarize the most important points.
What
- What are the main Threats against an IoT device/deployment?
- Can we find common Threats that apply to IoT devices/deployments?
- Are there generic Threats we could check for applicability?
- Could we organize the Threats in Risk Patterns for IoT devices/deployments?
- Can they be summarized on a Cheat Sheet form?
Outcomes
A Cheat Sheet covering most common threats against IoT devices/deployments.
Register as participant
To register as participant add IoT Threat Modeling Cheat Sheet
to either:
- the
sessions
metadata field from your participant's page (find your participant page and look for the edit link). - or the
participants
metadata field from this git session page
Back to list of all Working Sessions