Session Video
About the session:
Explore the use Wardley Maps in Security, and how Wardley Maps could be the missing piece of the puzzle when doing Threat Models
Related articles:
- Using Wardley Mapping for optimizing your Threat Modeling strategy - by Dave van Stein
- Tackling security with Wardley Maps - by Chris Daniel
- Maturity Mapping by Chris McDermott, Marc Burgauer and Gordon McMahon
Related presentations:
- Threat mapping - A workshop discussion - by Jakub Kaluzny
- Using Wardley Maps to Understand Security’s Landscape and Strategy - by Dinis Cruz
- Using Wardley mapping for Security Strategy and Architecture development - by Mario Platt
- Wardley Map of Threat Modeling which is a 6 minutes video snippet of the main Hacking threat modeling session - by Luis Servin
- Cybersecurity Why Context is your Crown Jewels - by Dinis Cruz
- Wardley Maps and services model at Glasswall - by Steve Purkis
- Pre-Summit 2020 videos Pre-summit: Wardley maps and Threat Modeling - 11 May , Pre-summit: Wardley maps and Threat Modelling 19th May
Wardley Maps OSS Presentations
- Wardley Maps Introduction - by Simon Wardley
- Maturity Mapping: Contextualise change and learning - by Chris McDermott
- Introduction to Wardley Mapping - by Cat Swetel
- Introduction to Wardley Mapping by by Chris Daniel
- Wardley Maps First Aid by Petra Vukmirovic
- Wardley Maps Introduction - by Goher Mohammad
Threat Modeling OSS Presentations
- Beginners Threat Modeling by James Bore
- Introduction to Threat Modeling by Avi Douglen by Avi Douglen
- Software Security and Threat Modelling- by Brook S.E. Schoenfield
- Threat Modeling Playbook - by Sebastien Deleersnyder
- Threat Modeling Manifesto by multiple Manifest Authors
- Threats categorization, pitfalls, different ways of applying it in practise - by James Bore
- Remote Threat Modeling by Didar Gelici