OWASP Based Threat Modelling - Creating A Feedback Model in an Agile Environment
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore OWASP-based threat modeling and learn how to create a feedback model in an agile environment in this 44-minute conference talk. Dive into commonly used frameworks, their relevance, and essential building blocks. Understand the process through a sample use case, covering requirement gathering, onboarding, and risk balancing. Discover the concept of threat surfing architecture and its application in onboarding new applications and baselining the threat landscape. Gain insights into the benefits and key takeaways of implementing this approach to enhance your organization's security posture.
Syllabus
Intro
Agenda
Some of the commonly used frameworks
Relevance
Building blocks
Process
Sample Use Case
Requirement Gathering and Onboarding
Balancing the Risk
The missing piece
Threat Surfing Architecture
Onboarding new application
Baselining the threat landscape
Benefits
Key Takeaways
Taught by
OWASP Foundation
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network