Threat Modeling of Containerized Applications - Three Levels of Complexity
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the intricacies of threat modeling for containerized applications in this 26-minute conference talk from OWASP Global AppSec Tel Aviv. Delve into optimizing threat modeling processes, addressing the challenges organizations face in implementation, and learn how to adapt the model for container-specific security concerns. Discover real-world examples of how effective threat modeling can mitigate the impact of Docker and Kubernetes vulnerabilities. Gain insights from Elena Kravchenko, an experienced Application Security Expert and CISSP, as she shares strategies for measuring success, implementing incremental improvements, and integrating threat modeling throughout the development lifecycle.
Syllabus
Three levels of complexity: Threat Modeling of Containerized Application ELENA KRAVCHENKO
Taught by
OWASP Foundation
Related Courses
DevOps CI/CD Pipeline: Automation from development to deploymentUniversidad Anáhuac via edX DevOps Pipeline: Automatización hasta el despliegue
Universidad Anáhuac via edX Exploring the Benefits of Continuous Security and Compliance for Cloud Infrastructure
Pluralsight Integrating Incident Response into DevSecOps
Pluralsight DevSecOps: Building a Secure Continuous Delivery Pipeline
LinkedIn Learning