🔊 Recap: Unlocking the Power of Threat Modelling Webinar 📅 On July 12th, the (ISC)²Montreal Chapter joined forces with IriusRisk to bring you an insightful webinar on "How to Approach Threat Modelling." 🚀 🔐 In today's rapidly evolving cybersecurity landscape, understanding and effectively addressing potential threats is of paramount importance. Our webinar delved into the world of threat modelling, equipping attendees with valuable insights and strategies to enhance their security posture. Missed the Live Session? Don't Worry! For those who couldn't join us live or want to revisit the insightful discussion, we've got you covered. The recorded webinar is now available for you to watch at your convenience. We extend our sincere gratitude to everyone who participated, making this webinar a resounding success. Stay tuned for more engaging sessions, events, and collaborations as we continue our mission to empower the cybersecurity community. Thank you to our partners at IriusRisk and to all attendees who helped make this webinar a valuable learning experience. Let's keep the momentum going and drive forward the conversation on cybersecurity excellence. #ISC2MTL #IriusRisk #WebinarRecap #ThreatModelling #CybersecurityInsights #KnowledgeSharing #StayTuned
Brendan Luchen’s Post
More Relevant Posts
-
Going through these rooms and learning and / or brushing up on these TTP are always a great way to refresh the mind and stay active in the GRC and threat modeling perspective.
To view or add a comment, sign in
-
Need more threat modeling insights? Join a global (and agnostic) community to continue building on your threat modeling knowledge. It is full of advice and practical tips from people who have been threat modeling for years, as well as complete novices. A great place to learn with like minded professionals. https://hubs.li/Q01WgdML0 #devsec #developertools #securebydesign #threatmodeling #threatmodel #security #community #developercommunities
To view or add a comment, sign in
-
Check your mail, because the latest TMI has just dropped! 🤩 This month’s edition features an article written by our very own Steven Wierckx, discussing using old-school security for modern threat modeling and why they are still very relevant today. 👇 But that’s not all of course, let’s take a look at what else we have in store for this month’s edition: 📍 Guest article: Retro Tech Tactics: Using Old-School Security for Modern Threat Modeling, written by Steven Wierckx 📍 Curated content: Security Architecture Build Phase: Planning and building a defendable architecture 📍 Curated content: Google's Threat Model for Post-Quantum Cryptography 📍 Toreon blog: Threat Modeling Playbook Part 4 - Strengthen your threat model processes 📍 Tips & tricks: Book tip: Security Engineering — Third Edition 📍 An update on our upcoming training sessions Enjoy the read! 📰 https://lnkd.in/eW63gNXN #toreon #tmi #threatmodeling #cybersecurity #informationsecurity
Threat Modeling Insider - April 2024 - Toreon
toreon.com
To view or add a comment, sign in
-
🚀 Wow, time flies! 🕒 We've hit the 34th edition of our threat modeling newsletter! 📰 We're always uncovering awesome insights on threat modeling, and this edition is no exception! 🌟 Whether you're a newbie or a seasoned expert, you'll find it incredibly valuable. Don't miss out! 💡 #ThreatModeling #CyberSecurity #Newsletter #Toreon
Check your mail, because the latest TMI has just dropped! 🤩 This month’s edition features an article written by our very own Steven Wierckx, discussing using old-school security for modern threat modeling and why they are still very relevant today. 👇 But that’s not all of course, let’s take a look at what else we have in store for this month’s edition: 📍 Guest article: Retro Tech Tactics: Using Old-School Security for Modern Threat Modeling, written by Steven Wierckx 📍 Curated content: Security Architecture Build Phase: Planning and building a defendable architecture 📍 Curated content: Google's Threat Model for Post-Quantum Cryptography 📍 Toreon blog: Threat Modeling Playbook Part 4 - Strengthen your threat model processes 📍 Tips & tricks: Book tip: Security Engineering — Third Edition 📍 An update on our upcoming training sessions Enjoy the read! 📰 https://lnkd.in/eW63gNXN #toreon #tmi #threatmodeling #cybersecurity #informationsecurity
Threat Modeling Insider - April 2024 - Toreon
toreon.com
To view or add a comment, sign in
-
DOMAIN CONTROLLER | Active Directory Management | MECM | EXCHANGE SERVER | CISCO SECURITY APPLIANCES | EV Administration
There are always threats in the digital world. Please do visit my new post on my blog Explaining about Threat Actors in Digital World and six steps on threat modelling process. https://lnkd.in/dzz8qSyW Please do give feedback
Threat Modeling Process in Cybersecurity
cyberinfopk.blogspot.com
To view or add a comment, sign in
-
In this episode of "Cyber from the Frontlines," we dive into the practice of Threat Modeling with Vandana Verma, a cybersecurity expert at Snyk, an OWASP board member , and the President of InfoSec Girls. Vandana's unique journey into cybersecurity and her work at InfoSec Girls sets the stage for an insightful conversation on threat modeling. The discussion then revolves around the benefits of incorporating threat modeling into security practices and how to prioritize threat modeling efforts with limited resources. Vandana recommends tools for threat modeling and especially highlights Threat Modeling Manifesto, a resource developed by industry experts. Tune in to gain valuable insights on threat modeling Spotify: https://lnkd.in/edg3dYr5 Youtube: https://lnkd.in/efbReZwv
E11 Threat Modeling 101
https://www.youtube.com/
To view or add a comment, sign in
-
🔍 Facing a 'giant' in threat modeling? Remember, it's all about perspective. Sometimes, we make things seem bigger than they really are. Embrace incremental changes and assess the true scale of your security challenges. Let's not be intimidated by giants! 🚀 #ThreatModeling #IncrementalChange https://buff.ly/48MFPvT
To view or add a comment, sign in
-
🔒 Just completed Microsoft's Introduction to Threat Modeling! 🔍 Key takeaways: 1️⃣ Capturing requirements and assumptions for data-flow diagrams. 2️⃣ Uncovering security issues with a framework. 3️⃣ Using security-control categories to eliminate threats. 4️⃣ Prioritizing verification before deployment. #ThreatModeling #MicrosoftCertification #Cybersecurity #InfoSec
Introduction to threat modeling
learn.microsoft.com
To view or add a comment, sign in