Caffeinated Risk cover image

Security risk analysis using attack trees with Terry Ingoldsby

Caffeinated Risk

00:00

Evolution of Attack Trees in Security Risk Analysis

The chapter traces the origins of attack trees in the speaker's journey from system administration to developing the attack tree methodology for risk assessment. It discusses the development of a software tool for threat analysis, unexpected clientele base, and its application in information assurance for the F-35 fighter plane's avionics. The conversation also delves into presenting complex security risk analyses to executives, integrating machine learning into attack trees, and the challenges and benefits of this approach.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app