SlideShare a Scribd company logo
1 of 105
Download to read offline
Threat Modeling 101
Safety First
DAN HARDIKER | CTO | @ADAPTAVIST | @DHARDIKER
https://cwatch.comodo.com/images-new/website-security-software.png
https://www.colocationamerica.com/images/ip-lookup-location.jpg
https://images.techhive.com/images/article/2016/06/box-of-chocolates-100664145-primary.idge.jpg
47.9%
https://wwwen.uni.lu/university/news/latest_news/social_engineering_password_in_exchange_for_chocolate
What is Security about?
MINDSET
http://www.ofmonksandmen.com/?p=268
STORYTELLING
KEY CONCEPTS
KEY CONCEPTS
KEY CONCEPTS
‣ Confidentiality
KEY CONCEPTS
‣ Confidentiality
‣ Integrity
KEY CONCEPTS
‣ Confidentiality
‣ Integrity
‣ Availability
KEY CONCEPTS
‣ Confidentiality
‣ Integrity
‣ Availability
KEY CONCEPTS
https://www.pinterest.co.uk/pin/256423772505109414/
FRAMEWORKS & STANDARDS
27001
27018
Threat Modeling 101
http://www.freeimageslive.co.uk/free_stock_image/color-blocks-jpg
ASSETS
ASSETS
ASSETS
ASSETS
ASSETS
ASSETS
ASSETS
ATTACKERS
ATTACKERS
https://www.kissclipart.com/hacker-clipart-security-hacker-clip-art-fnyrw5/
ATTACKERS
https://www.kissclipart.com/hacker-clipart-security-hacker-clip-art-fnyrw5/
ATTACKERS
https://www.kissclipart.com/hacker-clipart-security-hacker-clip-art-fnyrw5/
ATTACKERS
https://www.kissclipart.com/hacker-clipart-security-hacker-clip-art-fnyrw5/
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
The consideration of unwanted
access to assets by attackers
using attack vectors.
THREAT MAP
Batman
Example #1
Bruce Wayne / Batman’s Threat Model
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
CONTROLS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
CONTROLS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
ENCRYPTION
CONTROLS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
ENCRYPTION
HIDE LOCATION
CONTROLS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
ENCRYPTION
HIDE LOCATION
SECURITY SYSTEM
My First Models
Generic / Server / Cloud
GENERIC ORGANISATION
GENERIC ORGANISATION
DIGITAL ASSETS PHYSICAL ASSETS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
DOCUMENTS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
DOCUMENTS LAPTOPS
SERVERS
PHONES
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
VULNERABILITY
SCANNERS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
WEB CRAWLERS
VULNERABILITY
SCANNERS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
WEB CRAWLERS
VULNERABILITY
SCANNERS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
CORPORATE
ESPIONAGE
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
CORPORATE
ESPIONAGE
DATA
HARVESTING
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
CORPORATE
ESPIONAGE
DATA
HARVESTING
RANSOMWARE
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
CORPORATE
ESPIONAGE
DATA
HARVESTING
RANSOMWARE
BOTNETS
SERVER APP
SERVER APP
ASSETS
SERVER APP
ASSETS
VERSION
CONTROL
SERVER APP
ASSETS
VERSION
CONTROL
CI / CD
SERVER APP
ASSETS
VERSION
CONTROL
CI / CD
RELEASE
REPOSITORY
SERVER APP
ASSETS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
MALWARE PAYLOAD
SERVER APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
DATA HARVESTING
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
MALWARE PAYLOAD
CLOUD APP
CLOUD APP
ASSETS
CLOUD APP
ASSETS
INFRA AS CODE
PIPELINE
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
DATABASES
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
DATABASES
EXECUTION
ENVIRONMENTS
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
DATABASES
EXECUTION
ENVIRONMENTS
DEV / TEST
ENVIRONMENTS
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
BACKUPS / DRDATABASES
EXECUTION
ENVIRONMENTS
DEV / TEST
ENVIRONMENTS
CLOUD APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
DATA HARVESTING
ARTIFACT
REPOSITORIES
MALWARE PAYLOAD
INFRA AS CODE
PIPELINE
BACKUPS / DRDATABASES
EXECUTION
ENVIRONMENTS
DEV / TEST
ENVIRONMENTS
If you only remember 3 things …
… things I said while you were sleeping
3 THINGS TO REMEMBER
1. Security is not an after thought. It’s Job Zero!
3 THINGS TO REMEMBER
1. Security is not an after thought. It’s Job Zero!
2. Threat Model as part of User Stories.
3 THINGS TO REMEMBER
1. Security is not an after thought. It’s Job Zero!
2. Threat Model as part of User Stories.
3. Ignorant humans are your biggest threat.
3 THINGS TO REMEMBER
‣ Ars Technica
‣ Schneier on Security
‣ The Hacker News
‣ OWASP
FURTHER READING
FURTHER READING
https://www.amazon.co.uk/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998
JUST DON’T FORGET…
https://xkcd.com/538/
DAN HARDIKER | CTO | @ADAPTAVIST | @DHARDIKER
Thank you!

More Related Content

What's hot

Welcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSWelcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSMike Felch
 
You can detect PowerShell attacks
You can detect PowerShell attacksYou can detect PowerShell attacks
You can detect PowerShell attacksMichael Gough
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?ONE BCG
 
Les menaces applicatives
Les menaces applicativesLes menaces applicatives
Les menaces applicativesBee_Ware
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing Priyanka Aash
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesSoftware Guru
 
MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0Michael Gough
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...Edureka!
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual cisoMichael Ball
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) securityNahidul Kibria
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationExigent Technologies LLC
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top TenSecurity Innovation
 
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudMITRE ATT&CK
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkChaitanya Bhatt
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application SecurityPrateek Jain
 

What's hot (20)

Advanced API Security
Advanced API SecurityAdvanced API Security
Advanced API Security
 
Welcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWSWelcome to the Jungle: Pentesting AWS
Welcome to the Jungle: Pentesting AWS
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
You can detect PowerShell attacks
You can detect PowerShell attacksYou can detect PowerShell attacks
You can detect PowerShell attacks
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?
 
Les menaces applicatives
Les menaces applicativesLes menaces applicatives
Les menaces applicatives
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application Vulnerabilities
 
MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0MITRE AttACK framework it is time you took notice_v1.0
MITRE AttACK framework it is time you took notice_v1.0
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual ciso
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top Ten
 
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The Cloud
 
OWASP based Threat Modeling Framework
OWASP based Threat Modeling FrameworkOWASP based Threat Modeling Framework
OWASP based Threat Modeling Framework
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 

Similar to Threat Modeling 101

Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?Arthur Paixão
 
The Mobile Tribe
The Mobile TribeThe Mobile Tribe
The Mobile TribeDan Keldsen
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
 
Securing Your BBC Identity
Securing Your BBC IdentitySecuring Your BBC Identity
Securing Your BBC IdentityMarc Littlemore
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityClare Nelson, CISSP, CIPP-E
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearIronCore Labs
 
Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxMuddasarahmed5
 
Security perspective -human factor
Security perspective -human factorSecurity perspective -human factor
Security perspective -human factorArtur Marek Maciąg
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
NTXISSACSC3 - 7 Security Mindsets to Adopt Today by Ted Gruenloh
NTXISSACSC3 - 7 Security Mindsets to Adopt Today by Ted GruenlohNTXISSACSC3 - 7 Security Mindsets to Adopt Today by Ted Gruenloh
NTXISSACSC3 - 7 Security Mindsets to Adopt Today by Ted GruenlohNorth Texas Chapter of the ISSA
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thUnited Technology Group (UTG)
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open SourcePOSSCON
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 

Similar to Threat Modeling 101 (20)

Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?
 
The Mobile Tribe
The Mobile TribeThe Mobile Tribe
The Mobile Tribe
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
Fraud and Cybersecurity: How are they Related?
Fraud and Cybersecurity: How are they Related?Fraud and Cybersecurity: How are they Related?
Fraud and Cybersecurity: How are they Related?
 
Securing Your BBC Identity
Securing Your BBC IdentitySecuring Your BBC Identity
Securing Your BBC Identity
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
sanfranAIG3
sanfranAIG3sanfranAIG3
sanfranAIG3
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptx
 
Security perspective -human factor
Security perspective -human factorSecurity perspective -human factor
Security perspective -human factor
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
NTXISSACSC3 - 7 Security Mindsets to Adopt Today by Ted Gruenloh
NTXISSACSC3 - 7 Security Mindsets to Adopt Today by Ted GruenlohNTXISSACSC3 - 7 Security Mindsets to Adopt Today by Ted Gruenloh
NTXISSACSC3 - 7 Security Mindsets to Adopt Today by Ted Gruenloh
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Cyber Security and Open Source
Cyber Security and Open SourceCyber Security and Open Source
Cyber Security and Open Source
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Montclair share preso
Montclair share presoMontclair share preso
Montclair share preso
 

More from Atlassian

International Women's Day 2020
International Women's Day 2020International Women's Day 2020
International Women's Day 2020Atlassian
 
10 emerging trends that will unbreak your workplace in 2020
10 emerging trends that will unbreak your workplace in 202010 emerging trends that will unbreak your workplace in 2020
10 emerging trends that will unbreak your workplace in 2020Atlassian
 
Forge App Showcase
Forge App ShowcaseForge App Showcase
Forge App ShowcaseAtlassian
 
Let's Build an Editor Macro with Forge UI
Let's Build an Editor Macro with Forge UILet's Build an Editor Macro with Forge UI
Let's Build an Editor Macro with Forge UIAtlassian
 
Meet the Forge Runtime
Meet the Forge RuntimeMeet the Forge Runtime
Meet the Forge RuntimeAtlassian
 
Forge UI: A New Way to Customize the Atlassian User Experience
Forge UI: A New Way to Customize the Atlassian User ExperienceForge UI: A New Way to Customize the Atlassian User Experience
Forge UI: A New Way to Customize the Atlassian User ExperienceAtlassian
 
Take Action with Forge Triggers
Take Action with Forge TriggersTake Action with Forge Triggers
Take Action with Forge TriggersAtlassian
 
Observability and Troubleshooting in Forge
Observability and Troubleshooting in ForgeObservability and Troubleshooting in Forge
Observability and Troubleshooting in ForgeAtlassian
 
Trusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelTrusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelAtlassian
 
Designing Forge UI: A Story of Designing an App UI System
Designing Forge UI: A Story of Designing an App UI SystemDesigning Forge UI: A Story of Designing an App UI System
Designing Forge UI: A Story of Designing an App UI SystemAtlassian
 
Forge: Under the Hood
Forge: Under the HoodForge: Under the Hood
Forge: Under the HoodAtlassian
 
Access to User Activities - Activity Platform APIs
Access to User Activities - Activity Platform APIsAccess to User Activities - Activity Platform APIs
Access to User Activities - Activity Platform APIsAtlassian
 
Design Your Next App with the Atlassian Vendor Sketch Plugin
Design Your Next App with the Atlassian Vendor Sketch PluginDesign Your Next App with the Atlassian Vendor Sketch Plugin
Design Your Next App with the Atlassian Vendor Sketch PluginAtlassian
 
Tear Up Your Roadmap and Get Out of the Building
Tear Up Your Roadmap and Get Out of the BuildingTear Up Your Roadmap and Get Out of the Building
Tear Up Your Roadmap and Get Out of the BuildingAtlassian
 
Nailing Measurement: a Framework for Measuring Metrics that Matter
Nailing Measurement: a Framework for Measuring Metrics that MatterNailing Measurement: a Framework for Measuring Metrics that Matter
Nailing Measurement: a Framework for Measuring Metrics that MatterAtlassian
 
Building Apps With Color Blind Users in Mind
Building Apps With Color Blind Users in MindBuilding Apps With Color Blind Users in Mind
Building Apps With Color Blind Users in MindAtlassian
 
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...Atlassian
 
Beyond Diversity: A Guide to Building Balanced Teams
Beyond Diversity: A Guide to Building Balanced TeamsBeyond Diversity: A Guide to Building Balanced Teams
Beyond Diversity: A Guide to Building Balanced TeamsAtlassian
 
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed Team
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed TeamThe Road(map) to Las Vegas - The Story of an Emerging Self-Managed Team
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed TeamAtlassian
 
Building Apps With Enterprise in Mind
Building Apps With Enterprise in MindBuilding Apps With Enterprise in Mind
Building Apps With Enterprise in MindAtlassian
 

More from Atlassian (20)

International Women's Day 2020
International Women's Day 2020International Women's Day 2020
International Women's Day 2020
 
10 emerging trends that will unbreak your workplace in 2020
10 emerging trends that will unbreak your workplace in 202010 emerging trends that will unbreak your workplace in 2020
10 emerging trends that will unbreak your workplace in 2020
 
Forge App Showcase
Forge App ShowcaseForge App Showcase
Forge App Showcase
 
Let's Build an Editor Macro with Forge UI
Let's Build an Editor Macro with Forge UILet's Build an Editor Macro with Forge UI
Let's Build an Editor Macro with Forge UI
 
Meet the Forge Runtime
Meet the Forge RuntimeMeet the Forge Runtime
Meet the Forge Runtime
 
Forge UI: A New Way to Customize the Atlassian User Experience
Forge UI: A New Way to Customize the Atlassian User ExperienceForge UI: A New Way to Customize the Atlassian User Experience
Forge UI: A New Way to Customize the Atlassian User Experience
 
Take Action with Forge Triggers
Take Action with Forge TriggersTake Action with Forge Triggers
Take Action with Forge Triggers
 
Observability and Troubleshooting in Forge
Observability and Troubleshooting in ForgeObservability and Troubleshooting in Forge
Observability and Troubleshooting in Forge
 
Trusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelTrusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy Model
 
Designing Forge UI: A Story of Designing an App UI System
Designing Forge UI: A Story of Designing an App UI SystemDesigning Forge UI: A Story of Designing an App UI System
Designing Forge UI: A Story of Designing an App UI System
 
Forge: Under the Hood
Forge: Under the HoodForge: Under the Hood
Forge: Under the Hood
 
Access to User Activities - Activity Platform APIs
Access to User Activities - Activity Platform APIsAccess to User Activities - Activity Platform APIs
Access to User Activities - Activity Platform APIs
 
Design Your Next App with the Atlassian Vendor Sketch Plugin
Design Your Next App with the Atlassian Vendor Sketch PluginDesign Your Next App with the Atlassian Vendor Sketch Plugin
Design Your Next App with the Atlassian Vendor Sketch Plugin
 
Tear Up Your Roadmap and Get Out of the Building
Tear Up Your Roadmap and Get Out of the BuildingTear Up Your Roadmap and Get Out of the Building
Tear Up Your Roadmap and Get Out of the Building
 
Nailing Measurement: a Framework for Measuring Metrics that Matter
Nailing Measurement: a Framework for Measuring Metrics that MatterNailing Measurement: a Framework for Measuring Metrics that Matter
Nailing Measurement: a Framework for Measuring Metrics that Matter
 
Building Apps With Color Blind Users in Mind
Building Apps With Color Blind Users in MindBuilding Apps With Color Blind Users in Mind
Building Apps With Color Blind Users in Mind
 
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...
 
Beyond Diversity: A Guide to Building Balanced Teams
Beyond Diversity: A Guide to Building Balanced TeamsBeyond Diversity: A Guide to Building Balanced Teams
Beyond Diversity: A Guide to Building Balanced Teams
 
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed Team
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed TeamThe Road(map) to Las Vegas - The Story of an Emerging Self-Managed Team
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed Team
 
Building Apps With Enterprise in Mind
Building Apps With Enterprise in MindBuilding Apps With Enterprise in Mind
Building Apps With Enterprise in Mind
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Threat Modeling 101