Select Page
Threat Modeling In Software Development Life Cycle (SDLC)

In this workshop our expert will take you through the process of Threat modeling. You learn about the main idea behind threat modeling and how to bring security and software development together in the Software Development Life Cycle and to collaborate on a shared understanding and development of the system. We will also discuss the following:Ensure business requirements (or goals) are adequately protected in the face of a malicious actor, accidents, or other causes of impact.

How to identify threats and compliance requirements, and evaluate their risks.
How to define and build required controls.
Learn to balance risks, controls, and usability.
Identify where building a control is unnecessary, based on acceptable risk.
Document threats and mitigation.
Identification of security test cases / security test scenarios to test the security requirements.

We look forward to having you around for the workshop.

 

More Articles

Surviving Identity Theft

Surviving Identity Theft

What is Identity Theft? Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name. If you don’t take precautions, you...

Securing Wi-Fi At Home

Securing Wi-Fi At Home

Overview  To create a secure home network, you need to start by securing your Wi–Fi access point (sometimes called a Wi–Fi router). This is the device that controls who and what can connect to your home network. Here are five simple steps to securing your home Wi–Fi...