05.08.2016 Views

Problem

us-16-Weston-Windows-10-Mitigation-Improvements

us-16-Weston-Windows-10-Mitigation-Improvements

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Assume Breach<br />

Prevent Breach<br />

Threat model<br />

Code review<br />

Security testing<br />

Security development lifecycle<br />

(SDL)<br />

• Detection, Containment, Response,<br />

and Recover<br />

Redteams<br />

Assume Breach<br />

War game exercises<br />

Central security monitors<br />

Live site penetration test<br />

Hypothesis: We can use the assume breach approach to model exploitation and<br />

drive mitigations

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!