Threat Modeling Webinar: find problems when there's time to fix them

Applications and systems are commonly part of a chain of information-processing systems. When securing an application, system or the complete chain, it is important to know from which perspective threats arise and how a system can be attacked. Threat modeling can be incredibly valuable and cost-effective in this process, as it provides a method to structurally map the attack surface of an environment and to identify which threats are applicable.

In this part of our webinar series the basics of threat modeling will be explained. We will guide you through the concepts of the Microsoft threat modeling methodology. To show how threat modeling can be used in real life, we will analyse a real life scenario in which multiple threats were abused to form one of the biggest data leaks of the recent years.

Date: Thursday 12 September 2019
Time: 11.00 AM - 12.00 PM CEST LIVE
Presenter: Roy Duisters

 Sign up now

In this webinar, we will try to give you the knowledge required to get started with threat modeling exercises in real life, based on years of leading and performing threat modeling exercises at Secura's customers.

  • Learn to map the attack surface of applications using threat modeling data flow diagrams (DFD)
  • Learn to structurally identify threats using Microsoft’s STRIDE approach
  • Learn about tools that can assist you to perform threat modeling exercises
  • Get tips and tricks to get started in real life

Who should attend?

This webinar is suitable for: Security architects and engineers, software engineers and technical staff involved in security management.

Learn from the expert

roy duisters secura

Roy Duisters, Principal Security Specialist at Secura
Roy is an experienced principal security consultant with 7+ years of experience leading our Red Teaming division. Threat modeling and ICS/SCADA investigations are a speciality and passion of Roy. One of Roy’s missions is “demystifying” complicated security vulnerabilities. The only way the catastrophic security failures of the past can be prevented in the future, is by understanding the underlying issues.

@ Secura 2019
Webdesign Studio HB / webdevelopment Medusa