Skip to content

Latest commit

 

History

History
54 lines (40 loc) · 1.36 KB

pres.md

File metadata and controls

54 lines (40 loc) · 1.36 KB
theme _class paginate backgroundColor backgroundImage marp
gaia
lead
true
url('./assets/hero-background.svg')
true

Threat modeling & TLP

How can TLP help share only the right amount of what keeps devs up at night?


Who am I?

  • Former NISTer
  • Present-day US Government data scientist, IETF volunteer
  • Today, I am here in my unofficial capacity (opinions my own)
  • I have a lot of opinions on these topics:
    • Cybersecurity automation
    • Data formats and protocols, security and otherwise
    • Approachable cybersecurity "for the rest of us"

What's threat modeling?

  • Let's list and diagram:

    • assets;
    • threats;
    • mitigations;
    • and most importantly, gaps!
  • What about the real world? Does it scale?

    • Multiple parties + systems of systems → grokking the attack surface of the whole Internet!?

But what about ...

  • Generative AI?
  • Secure multi-party computation?
  • Homomorphic encryption?
  • TLP?
    • Circling back on GenAI, SMPC, and HME, with labelled TLP data?

Questions, comments, complaints?

  • Thanks for paying attention and caring about this!
  • Email me at aj@gsa.gov.
  • Find me on GitHub.