Threat Modeling in the “Shift Security Left” era
Shifting security left in the software development lifecycle has proven to have a significant impact on the security posture of software: vulnerabilities are found early on in the process, making it easier and more cost effective to fix them. How can Threat Modeling become an integral part of your organization’s shift security left strategy? How can you, the developer, design secure software? Learn what is Threat Modeling and how to apply Threat Modeling techniques in each stage of the software development lifecycle. Start thinking as an attacker!
Other sessions from: Break out Sessions

How a culture upgrade helped me thrive 💪
Lots of people talk about culture in organisations, but not many organisa...


PASTA and OCTIVE and STRIDE, Oh My! Bringing Threat Modeling Out of the Woods
Threat modeling is an extremely valuable tool in the secure software...


Trust: From Zero to Hero
Wouldn’t it be great if everyone behaved securely? Devs writing secure code...
