PPT Slide
- What is the threat profile?
- What types of things do the threats do?
- What is vulnerable re: that threat profile?
- How dependent on vulnerable systems?
- Can the threat profile be changed?
- Can the vulnerability be changed?
- Can the dependency be changed?
- Can the harm be mitigated in other ways?
- How can we do these things?
- What fits the way we work?