Applications and systems are commonly part of a chain of information-processing systems. When securing an application, system or the complete chain, it is important to know from which perspective threats arise and how a system can be attacked. Threat modeling can be incredibly valuable and cost-effective in this process, as it provides a method to structurally map the attack surface of an environment and to identify which threats are applicable.
In this part of our webinar series the basics of threat modeling will be explained. We will guide you through the concepts of the Microsoft threat modeling methodology. To show how threat modeling can be used in real life, we will analyse a real life scenario in which multiple threats were abused to form one of the biggest data leaks of the recent years.
In this webinar, we will try to give you the knowledge required to get started with threat modeling exercises in real life, based on years of leading and performing threat modeling exercises at Secura's customers.
Who should attend?
This webinar is suitable for: Security architects and engineers, software engineers and technical staff involved in security management.