target audience: TECH BUYER  Publication date: Feb 2024 - Document type: IDC Perspective - Doc  Document number: # US51841324

How Threat Modeling Enables Security by Design

By:  Nick Kirtley Loading

Content



Related Links

Table of Contents


  • Executive Snapshot

    • Figure: Executive Snapshot: How Threat Modeling Enables Security by Design

  • Situation Overview

    • Figure: The Foundations of Effective Threat Modeling

    • Figure: The Threat Modeling Risk Puzzle

    • Adoption of Threat Modeling

    • Figure: IDC’s Future of Trust Framework

    • Threat Modeling Tools

    • Preparing for Threat Modeling

  • Advice for the Technology Buyer

  • Learn More

    • Related Research

    • Synopsis