Tuesday Jun 19
09:30 –

The Evolution of Threat Models for Secure Communication Products

This video is also available in the GOTO Play video app! Download it to enjoy offline access to our conference videos while on the move.

Available in Google Play Store or Available in Apple App Store

What happens when a company has to include itself in its threat model? Phil will speak about designing end-to-end secure protocols that are designed to defend against even the secure product vendor and/or the service provider. He will also talk about the recent Efail vulnerabilities that affected S/MIME and PGP mail clients, and how threat models have evolved since PGP was first developed.

cyber security