Threat Modeling Insider – August 2024

Threat Modeling Insider Newsletter

36th Edition – August 2024

Join us at ThreatModCon SF!

We’ll be at ThreatModCon San Francisco next month—your must-attend event for professionals eager to deepen their threat modeling expertise.

Welcome!

We’ve got some exciting stuff in this month’s newsletter. Our feature is all about combining threat modeling with OWASP SAMM – it’s a game-changer for product security. Also, ThreatModCon San Francisco is coming up soon, and we’d love to see you there.

But that’s not all of course, let’s take a look at what else we have in store for this month’s edition: 

Threat Modeling Insider edition

Welcome!

Threat Modeling Insider edition

We’ve got some exciting stuff in this month’s newsletter. Our feature is all about combining threat modeling with OWASP SAMM – it’s a game-changer for product security. Also, ThreatModCon San Francisco is coming up soon, and we’d love to see you there.

But that’s not all of course, let’s take a look at what else we have in store for this month’s edition: 

On this edition

Tips & tricks
New O’Reilly training: Secure Your Design with Threat Modeling 

Training update
An update on our upcoming training sessions.

Guest article

The Power of Threat Modeling Capabilities and OWASP SAMM Mapping for Product Security

In today’s cybersecurity landscape, threat modeling has become an essential practice for organizations aiming to secure high-profile products. This article explores how integrating threat modeling with the OWASP Software Assurance Maturity Model (SAMM) can significantly enhance your product’s security, making it an attractive choice for major industry players.

CURATED CONTENT

Handpicked for you

Toreon Blog: Threat Modeling in 4 steps

Gamify Threat Modeling with OWASP Cornucopia 2.0

Curious about threat modeling but unsure where to start?

Our latest blog simplifies the process into 4 clear steps to follow. Whether you’re looking to enhance your security posture or just curious about the process, this guide provides practical tips and examples to get you started.

OWASP Cornucopia 2.0 turns threat modeling into a fun, card-based challenge that helps dev teams weave security into their projects, all while playing nice with industry standards and making security everyone’s game. 

Build Reusable, Robust Systems with Security Patterns

SecurityPatterns.io is a comprehensive resource for developing robust security patterns, offering detailed guides and practical examples to help security professionals design reusable, compliant systems. Additionally, we’ve developed an in-company training program tailored to deepen your team’s understanding and application of these security patterns, available upon request. 

Gamify Threat Modeling with OWASP Cornucopia 2.0

OWASP Cornucopia 2.0 turns threat modeling into a fun, card-based challenge that helps dev teams weave security into their projects, all while playing nice with industry standards and making security everyone’s game. 

Build Reusable, Robust Systems with Security Patterns

SecurityPatterns.io is a comprehensive resource for developing robust security patterns, offering detailed guides and practical examples to help security professionals design reusable, compliant systems. Additionally, we’ve developed an in-company training program tailored to deepen your team’s understanding and application of these security patterns, available upon request. 

TIPS & TRICKS

New O’Reilly training: Secure Your Design with Threat Modeling

In this O’Reilly video course, personally crafted by yours truly, you’ll master threat modeling through hands-on whiteboard hacking exercises. Learn to identify vulnerabilities, apply the STRIDE model, and confidently integrate security into your development lifecycle. 

Upcoming trainings & events

Book a seat in our upcoming trainings & events

Threat Modeling Practitioner training, hybrid online, hosted by DPI

Cohort starting on 23 Sep 2024

Agile Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, hosted by Global AppSec OWASP, San Francisco, USA 

Next training dates:
24-25 September 2024

Agile Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, hosted by HITB, Abu Dhabi 

Next training dates:
25-26 November 2024

Threat Modeling Practitioner training, hybrid online, hosted by DPI

Cohort starting on 6 Dec 2024

Agile Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, hosted by Black Hat Europe, London

Next training dates:
9-10 December 2024

Threat Modeling Practitioner training, hybrid online, hosted by DPI

Cohort starting on 23 Sep 2024

Agile Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, hosted by HITB, Abu Dhabi 

Next training dates:
25-26 November 2024

Threat Modeling Practitioner training, hybrid online, hosted by DPI

Cohort starting on 6 Dec 2024

Agile Whiteboard Hacking a.k.a. Hands-on Threat Modeling, in-person, hosted by Black Hat Europe, London

Next training dates:
9-10 December 2024

Threat Modeling Insider Newsletter

Delivering the latest Threat Modeling articles and tips straight to your mailbox.

Start typing and press Enter to search

Shopping Cart