Introduction
                                    
                                        How to handle risk
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                1. Risk Management
                                    
                                        Risk management
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Quantitative risk assessment
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Risk management actions
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Ongoing risk management
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Risk management frameworks
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Risk visibility and reporting
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                2. Threat Modeling
                                    
                                        Identifying threats
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Understanding attacks
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Technology and process remediation
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                3. Threat Assessment
                                    
                                        Security assessment tools
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Scan for threats and vulnerabilities
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Assess threats
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Threat assessment techniques
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Penetration testing
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Advanced vulnerability scanning
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Common Vulnerability Scoring System (CVSS)
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Interpreting CVSS scores
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Analyzing scan reports
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                4. Remediating Vulnerabilites
                                    
                                        Report scan results
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Prioritize remediation
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Create a remediation workflow
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Barriers to vulnerability remediation
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                5. Security Monitoring
                                    
                                        Monitor log files
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Security information and event management
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Continuous security monitoring
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Visualization and reporting
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Compliance monitoring
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Legal and ethical issues in monitoring
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                6. Software Testing
                                    
                                        Code review
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Code tests
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Fuzz testing
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Interface testing
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Misuse case testing
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Test coverage analysis
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                Conclusion
                                    
                                        What's next?
                                            
                                                ()