Overview
Explore OWASP-based threat modeling and learn how to create a feedback model in an agile environment in this 44-minute conference talk. Dive into commonly used frameworks, their relevance, and essential building blocks. Understand the process through a sample use case, covering requirement gathering, onboarding, and risk balancing. Discover the concept of threat surfing architecture and its application in onboarding new applications and baselining the threat landscape. Gain insights into the benefits and key takeaways of implementing this approach to enhance your organization's security posture.
Syllabus
Intro
Agenda
Some of the commonly used frameworks
Relevance
Building blocks
Process
Sample Use Case
Requirement Gathering and Onboarding
Balancing the Risk
The missing piece
Threat Surfing Architecture
Onboarding new application
Baselining the threat landscape
Benefits
Key Takeaways
Taught by
OWASP Foundation