Featured
Why Threat Modeling Is Critical for Enterprise Cyber Defense
Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading
As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize how to fix them. In this webinar, experts discuss how to define security requirements, pinpoint and quantify potential vulnerabilities, and prioritize remediation methods. Learn how to conduct a threat modeling exercise and make risk-based decisions to strengthen your organization’s security.
During this webinar you will:
- Gain insights into how to establish a successful threat modeling process.
- Hear experts discuss how to shift to a more risk-based approach to cybersecurity.
- Learn what to expect out of a threat modeling exercise and how to apply it to shore up cybersecurity.
All episodes
-
Threat Modeling Program Maturity – Establish and Mature Threat Modeling Programs
Chandu Ketkar, Director Security Architecture Practice and Himanshu Tiwari, Managing Consultant
What differentiates a highly mature threat modeling program from a less mature program? How do companies get started with threat modeling? What does the journey to higher levels of maturity look like? What are the key anchors of building the threat modeling capability?
Join our talk as we share what we've learned through the years working with clients. Find out how companies evolve their threat modeling programs and maturity.
-
Why Threat Modeling Is Critical for Enterprise Cyber Defense
Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading
As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize how to fix them. In this webinar, experts discuss how to define security requirements, pinpoint and quantify potential vulnerabilities, and prioritize remediation methods. Learn how to conduct a threat modeling exercise and make risk-based decisions to strengthen your organization’s security.
During this webinar you will:
- Gain insights into how to establish a successful threat modeling process.
- Hear experts discuss how to shift to a more risk-based approach to cybersecurity.
- Learn what to expect out of a threat modeling exercise and how to apply it to shore up cybersecurity.