If security of the organization's IT systems is to be improved, the primary step towards that should be the modeling of threat risks. Why would you spend your resources, time, and money on controls with inferior results? Learn how to access risks in a systematic manner so that the security investment is result oriented. This training focuses on characterizing threats with STRIDE and quantifying, comparing and prioritizing risks with DREAD which are popular threat risk modeling techniques.
- IT Managers
- IS Assurance Professionals (IS Auditors, Risk & Compliance Professionals,...)
- IT Governance Professionals
- IS Security Professionals
- This training program is not for freshers. Available only for experienced professionals in the field as outlined in the above "Target Groups" section.
Kamal Wickramanayake (Profile)