Blog Posts Tagged with "Business Threat Modeling"

959779642e6e758563e80b5d83150a9f

Case Study: A Cloud Security Assessment

December 13, 2011 Added by:Danny Lieberman

A client asked us to find a way to reduce risk exposure at the lowest cost. Using the Business Threat Modeling methodology and Practical Threat Analysis software, we were able to mitigate 80% of the total risk exposure in dollars at half the security budget proposed by the vendor....

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

The Detection in Depth Focus Model

December 08, 2011 Added by:Brent Huston

As explained in the maturity model post before, the closer the detection control is to the asset, the higher the signal to noise ratio it should be and the higher the relevance o the data should be to the asset being protected (Huston’s Postulate)...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Case Study: SOX IT Compliance

December 01, 2011 Added by:Danny Lieberman

We performed a Sarbanes-Oxley IT top down security assessment for a NASDAQ-traded advanced technology company to evaluate internal and external threats that impact the company’s information assets. Using Business Threat Modeling, a practical threat analysis model was constructed...

Comments  (0)