SECURITY RESOURCES
Offensive minded security exploit development
Threat Modeling
What is Threat Modeling?

Security Testing, Threat Modeling, VerSprite Security Resources
Risk-Based Security Threat Modeling: 7-Step Process for Risk Analysis

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Offensive Threat Models Against the Supply Chain

Cybersecurity Library, Ebooks & Guides, Threat Modeling, VerSprite Security Resources
The Process for Attack Simulation and Threat Analysis

Threat Modeling, VerSprite Security Resources, Webinars
Leveraging PASTA Threat Modeling for Strategic Security Operations Management & Exploit Testing

Threat Modeling, VerSprite Security Resources
Building a Valid Threat Library for Cloud-Based Applications

Threat Modeling, VerSprite Security Resources, Videos
AppSec EU 2017: Modeling Threats for Applications

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Organizational Threat Models – Atlanta Cyber Security Summit 2016

Threat Modeling, VerSprite Security Resources, Videos
CRESTCON 2019: Threat Modeling for Defense and Offense

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Healthcare Threat Modeling Vignettes

Slides & Presentations, Threat Modeling, VerSprite Security Resources
Addressing Cybercrime via PASTA Threat Modeling

Slides & Presentations, Threat Modeling, VerSprite Security Resources, Web Application Security
Making Web Security PASTA – BSidesATL 2011

Subscribe for Our
Updates
Please enter your email address and receive the latest updates