Threat Modeling in the “Shift Security Left” era

Shifting security left in the software development lifecycle has proven to have a significant impact on the security posture of software: vulnerabilities are found early on in the process, making it easier and more cost effective to fix them. How can Threat Modeling become an integral part of your organization’s shift security left strategy? How can you, the developer, design secure software? Learn what is Threat Modeling and how to apply Threat Modeling techniques in each stage of the software development lifecycle. Start thinking as an attacker!

Eva Sarafianou

Eva Sarafianou

Senior Product Security Engineer @ Auth0 (she/her)

Other sessions from: Break out Sessions

Trust: From Zero to Hero

Trust: From Zero to Hero

Wouldn’t it be great if everyone behaved securely? Devs writing secure code...

Annybell Villarroel Annybell Villarroel
How a culture upgrade helped me thrive 💪

How a culture upgrade helped me thrive 💪

Lots of people talk about culture in organisations, but not many organisa...

Agata Krajewska Agata Krajewska
PASTA and OCTIVE and STRIDE, Oh My! Bringing Threat Modeling Out of the Woods

PASTA and OCTIVE and STRIDE, Oh My! Bringing Threat Modeling Out of the Woods

Threat modeling is an extremely valuable tool in the secure software...

Alyssa Miller Alyssa Miller