Diagram It: IoT
![](https://cdn.prod.website-files.com/650038f43bd74338d2d25f41/6571d69cc04bc9f36a125ad0_Calendar%20icon%20lumo.webp)
Wednesday, April 24, 2024
![](https://cdn.prod.website-files.com/650038f43bd74338d2d25f41/6571da7e082932878fb3e6ef_clock%20icon%20green.webp)
11:00-11:30AM ET/ 16:00 GMT/17:00 CET
In this session, we’ll examine multiple distinct representations of IoT within threat models. Through comparative analysis, the strengths and weaknesses of each approach are scrutinized, facilitating informed decision-making in threat modeling processes.
Diagram It: IoT
In this session, we’ll examine multiple distinct representations of IoT within threat models. Through comparative analysis, the strengths and weaknesses of each approach are scrutinized, facilitating informed decision-making in threat modeling processes.
![](https://cdn.prod.website-files.com/650d8cb4b59554163db63bab/660583ce3ce26881513e5b72_MAR-986-DiagramIt-IoT-Twitter-1600x900%20(1).jpg)
![](https://cdn.prod.website-files.com/650d8cb4b59554163db63bab/660583ce3ce26881513e5b72_MAR-986-DiagramIt-IoT-Twitter-1600x900%20(1).jpg)
Presenters
![](https://cdn.prod.website-files.com/650d8cb4b59554163db63bab/660564c97a9a09b4be05bad5_65ca410779dbe3f8d2b9df22_James%20rabe-p-500.webp)
James Rabe
Global Technical Program Manager, IriusRisk
Key Takeaways
Best practices for scoping and diagramming representations
Methodologies for effectively representing SSO systems
Understanding the impact on the value of threat models