Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
In this session we'll cover how to identify threats and vulnerabilities posed by an application's design, and how to document mitigations to these vulnerabilities, including the actual "code" for these mitigation techniques.