
Alexandra Zhigulina
Company: InfoTeCS
We'll learn about the most common obstacles you may encounter when writing security requirements. The main methods of fighting them will be discussed: laws and standards, the threat model, plugging holes. We will also learn how security requirements are related to other types of non-functional requirements.
Company: InfoTeCS
Company: Yandex Cloud