Live threat modeling of an "online food ordering" system

When (day):
16:00 - 17:00

Session Video

About this session

When learning threat modeling, there is a need for examples that are well thought out. Since DefCon 27 there is a threat modeling competition called “DEF CON’s Next Top Threat Model” ( The system described in this competition is a perfect example to find possible threats and evaluate them. The system described allows users to order food using a kiosk that also charges the customer’s credit card and prints the order in the kitchen printer. In this session we’ll analyze the system: draw diagrams using the C4 modeling technique ( to understand what are we building. Then we’ll start looking for anything that could go wrong and what we could do about it. It will be an interactive session where audience participation is actively encouraged.