Featured
Why Threat Modeling Is Critical for Enterprise Cyber Defense
Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading
As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize how to fix them. In this webinar, experts discuss how to define security requirements, pinpoint and quantify potential vulnerabilities, and prioritize remediation methods. Learn how to conduct a threat modeling exercise and make risk-based decisions to strengthen your organization’s security.
During this webinar you will:
- Gain insights into how to establish a successful threat modeling process.
- Hear experts discuss how to shift to a more risk-based approach to cybersecurity.
- Learn what to expect out of a threat modeling exercise and how to apply it to shore up cybersecurity.
All episodes
-
Threat Modeling: A Synopsys Approach
Chandu Ketkar, Director Security Architecture Practice and Andre Joseph, Principal Consultant at Synopsys
Including threat modeling early in the software development process can ensure your organization is building security into your applications. For applications that are further along in development or currently launched, it can help you pinpoint the need for additional security testing.
Threat modeling identifies the types of threats that are applicable in the context of the application and its environment. Knowledge of such threats, along with their likelihood and impact, enables us to secure our design in anticipation, identify security requirements early, and inform downstream security testing.There are many threat modeling approaches out there. In this webinar, we provide insights into Synopsys’ threat modeling approach, which has evolved as we’ve conducted threat assessments for various types of applications for our clients.
-
Threat Modeling Program Maturity – Establish and Mature Threat Modeling Programs
Chandu Ketkar, Director Security Architecture Practice at Synopsys and Himanshu Tiwari, Managing Consultant at Synopsys
What differentiates a highly mature threat modeling program from a less mature program? How do companies get started with threat modeling? What does the journey to higher levels of maturity look like? What are the key anchors of building the threat modeling capability?
Join our talk as we share what we've learned through the years working with clients. Find out how companies evolve their threat modeling programs and maturity.
-
Scoping and Data Gathering in Threat Modeling
Taylor Armerding, Security Advocate | Chris Cummings, Principal Consultant
Learn how to handle scoping and data gathering, two of five necessary steps in creating a useful threat modeling.
-
Creating a System Model in Threat Modeling
Taylor Armerding, Security Advocate | Chris Cummings, Principal Consultant
Learn how a system model helps guide the discussion and present results in threat modeling.
-
Creating an Attack Model in Threat Modeling
Taylor Armerding, Security Advocate | Chris Cummings, Principal Consultant
Learn more about how to use an attack model in threat modeling to answer the question of how well your assets are protected against threats.
-
Why Threat Modeling Is Critical for Enterprise Cyber Defense
Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading
As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize how to fix them. In this webinar, experts discuss how to define security requirements, pinpoint and quantify potential vulnerabilities, and prioritize remediation methods. Learn how to conduct a threat modeling exercise and make risk-based decisions to strengthen your organization’s security.
During this webinar you will:
- Gain insights into how to establish a successful threat modeling process.
- Hear experts discuss how to shift to a more risk-based approach to cybersecurity.
- Learn what to expect out of a threat modeling exercise and how to apply it to shore up cybersecurity.