Threat Modeling - go to homepage
Toggle Navigation
Search
Projects
Schedule
Members
Past Summits
Sep 2024
Jun 2024
Jan 2024
Oct 2023
Jun 2023
Apr 2023
Feb 2023
Dec 2022
Sep 2022
Jul 2022
May 2022
Mar 2022
Jan 2022
Nov 2021
Sep 2021
Jun 2021
May 2021
Apr 2021
Mar 2021
Jan 2021
Dec 2020
Nov 2020
Oct 2020
Future Summits
Dec 2024
Mar 2025
About
The Summit
Faq
Sponsors
Threat Modeling
tracks
needs organizer
This track is focused on Threat Modeling
All Threat Modeling Sessions
Title
Track
Year
Month
Agile Threat Modeling with Open-Source Tools
Threat Modeling
2021
Jun
Agile Threat Modeling with Open-Source Tools
Threat Modeling
2021
Nov
AI Agents for Cyber Threat Intelligence
Threat Modeling
2024
Jun
AI-Driven Threat Modelling with STRIDE GPT
Threat Modeling
2024
Jan
AMA with Adam Shostack
Threat Modeling
2022
Jul
Automating Architectural Risk Analysis with the Open Threat Model format
Threat Modeling
2022
Mar
Beginners Threat Modeling
Threat Modeling
2021
Jun
Drinks and Persona Building: Creating Adversary Trading Cards (1st Session)
Threat Modeling
Hacking threat modeling
Threat Modeling
2021
Sep
How to perform threat assessments, the right way!
Threat Modeling
2024
Jan
Introduction to Threat Modeling by Avi Douglen
Threat Modeling
IoT: pervasive vulnerability, threat landscape and end-users
Threat Modeling
2022
Jan
Learn Threat Modeling using the amazing OSS resources
Threat Modeling
2021
Nov
Live threat modeling of an "online food ordering" system
Threat Modeling
2023
Feb
OSS Threat Modeling and Moldable Development Projects
Threat Modeling
2021
Sep
Remote Threat Modeling
Threat Modeling
2021
Jan
Software Security and Threat Modelling
Threat Modeling
2022
Jan
The Survival Guide to implementing Threat Modeling
Threat Modeling
2022
Dec
Threat Hunting and Detection Strategies: Proactive Defense in Action (panel)
Threat Modeling
2024
Jun
Threat mapping - A workshop discussion
Threat Modeling
2021
Nov
Threat Model for an Autonomous System
Threat Modeling
2022
May
Threat Modeling - ICAP
Threat Modeling
Threat Modeling - O365 SaaS Provider
Threat Modeling
Threat Modeling Failure Modes
Threat Modeling
2022
Sep
Threat Modeling for Schrems II
Threat Modeling
2020
Nov
Threat Modeling for Serverless Architectures: Identifying Risks in a Serverless World (Panel)
Threat Modeling
2023
Oct
Threat Modeling Glasswall Cloud SDK
Threat Modeling
2021
May
Threat Modeling Glasswall Desktop
Threat Modeling
2020
Dec
Threat Modeling Glasswall Folder-to-Folder Plugin
Threat Modeling
2021
May
Threat Modeling Introduction
Threat Modeling
Threat Modeling Introduction
Threat Modeling
Threat Modeling Introduction (Wed)
Threat Modeling
Threat Modeling Kata
Threat Modeling
2023
Apr
Threat Modeling Kata IV
Threat Modeling
2024
Jan
Threat Modeling Kata Part 2
Threat Modeling
2023
Jun
Threat Modeling Kata Part 3
Threat Modeling
2023
Oct
Threat Modeling Manifesto
Threat Modeling
2020
Dec
Threat Modeling Playbook
Threat Modeling
2020
Oct
Threat Modeling the LLM Pipeline
Threat Modeling
2024
Sep
Threat Modeling Using Glamorous Toolkit
Threat Modeling
2021
May
Threat Modelling Adoption in Disciplines Other Than Development
Threat Modeling
2022
Sep
Threat Modelling as Code and Threat Modelling Challenges
Threat Modeling
2022
Jan
Threat Modelling as Code v2
Threat Modeling
2022
Dec
Threat Models and Wardley Maps
Threat Modeling
2022
Mar
Threats categorization, pitfalls, different ways of applying it in practise
Threat Modeling
2021
Jan
When C4s meet Threat Models
Threat Modeling
2022
Mar