The programme is a blend of practical use cases based on real-world projects and mentoring. Each use case includes an environmental description, questions, and templates for building a threat model.
Participants are challenged in virtual breakout rooms to carry out the different stages of threat modelling on the following:
Diagramming web and mobile applications, sharing the same REST backend
- Threat modelling an IoT gateway with a cloud-based update service
- Get into the attacker’s head – modelling points of attack against a CNI facility
- Threat mitigations for microservices and S3 buckets in a payment service
- Threat modelling the CI/CD pipeline
The results are discussed after each hands-on workshop, and participants receive a documented solution.
Recent Comments