Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Threat Modeling of Containerized Applications - Three Levels of Complexity

OWASP Foundation via YouTube

Overview

Explore the intricacies of threat modeling for containerized applications in this 26-minute conference talk from OWASP Global AppSec Tel Aviv. Delve into optimizing threat modeling processes, addressing the challenges organizations face in implementation, and learn how to adapt the model for container-specific security concerns. Discover real-world examples of how effective threat modeling can mitigate the impact of Docker and Kubernetes vulnerabilities. Gain insights from Elena Kravchenko, an experienced Application Security Expert and CISSP, as she shares strategies for measuring success, implementing incremental improvements, and integrating threat modeling throughout the development lifecycle.

Syllabus

Three levels of complexity: Threat Modeling of Containerized Application ELENA KRAVCHENKO

Taught by

OWASP Foundation

Reviews

Start your review of Threat Modeling of Containerized Applications - Three Levels of Complexity

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.