Threat Modeling Webinar: find problems when there's time to fix them
Applications and systems are commonly part of a chain of information-processing systems. When securing an application, system or the complete chain, it is important to know from which perspective threats arise and how a system can be attacked. Threat modeling can be incredibly valuable and cost-effective in this process, as it provides a method to structurally map the attack surface of an environment and to identify which threats are applicable.
In this part of our webinar series the basics of threat modeling will be explained. We will guide you through the concepts of the Microsoft threat modeling methodology. To show how threat modeling can be used in real life, we will analyse a real life scenario in which multiple threats were abused to form one of the biggest data leaks of the recent years.
Recording is now available. Watch it here.
Presenter: Roy Duisters
In this webinar, we will try to give you the knowledge required to get started with threat modeling exercises in real life, based on years of leading and performing threat modeling exercises at Secura's customers. This webinar is suitable for: Security architects and engineers, software engineers and technical staff involved in security management.
Interested to learn how Threat Modeling can raise your security maturity level? Join our 1-day Threat Modeling Training Course. This course can be organised in-company or open for public application (limited seats available)!
Roy Duisters, Principal Security Specialist at Secura
Roy is an experienced principal security consultant with 7+ years of experience leading our Red Teaming division. Threat modeling and ICS/SCADA investigations are a speciality and passion of Roy. One of Roy’s missions is “demystifying” complicated security vulnerabilities. The only way the catastrophic security failures of the past can be prevented in the future, is by understanding the underlying issues.