November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 1 Application Threat Modeling Workshop PART III Threat Modeling Demo & Practice.

Slides:



Advertisements
Similar presentations
When Loses Its Charm Team Collaboration Without Clogging Your Inbox Annette Marquis Gini Courter.
Advertisements

MANAGED SECURITY: Protecting your data and your business Insert reseller logo.
Sachin Rawat Crypsis SDL Threat Modeling.
Bringing Value to European Energy Sector
Philly SharePoint User Group January 25 th, 2012.
Risk Analysis James Walden Northern Kentucky University.
The Free IT Management App & Community. What Do I Have? How Do I Keep Track of Everything? Is Everything Working? How Do I Fix IT? IT Admin What IT Pros.
A Demo of and Preventing XSS in.NET Applications.
GPPC Connections 2011 | November 6-8 | Las Vegas, NV Do online project management solutions help our practices? Sandra Glick Stuart Gamm CriticalEdge Group,
What is Ask Us 24/7? Live Chat Reference – patrons can chat one-on-one with a librarian in real time......
AppSec USA 2014 Denver, Colorado Threat Modeling Made Interactive! Eunsuk Kang Software Design Group CSAIL, MIT.
Thessaloniki November Penetration Testing with Android Devices Hacking with our pocket device, made easy! Thomas Sermpinis a.k.a. Cr0wTom.
Desmos Cool Tools Innovative Technology Middle School-High School Age Group By Kari Ciesielczyk, JoAnna DiFalco, and Alexis Owen.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Spiceworks Overview Enterprise Business Group Jul-2015.
Application Threat Modeling Workshop
2012 IASA Advanced Boot Camp: Mastering the Art of Marketing & Selling to Insurance Companies! Thursday, March 15 th & Friday, March 16 th Omni Amelia.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Evolutionary Optimisation for Microsoft Excel
Batch Geocoding Online Bruce Harold
SharePoint 2010 Business Intelligence Overview John Gamble 12 th April 2011.
April 14, 2008 Secure Coding Faculty Workshop Web Application Security: Exercise Development Approaches James Walden
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Input Boundary Output Logi c Boundary Input User | OS Output Application Logic Data Transformation Data Copy Type Conversion Data Transformation.
Risk Analysis in Software Design Author: Verdon, D. and McGraw, G. Presenter: Chris Hundersmarck.
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Threat Modeling: Security Development Lifecycle Tyrell Flurry Jeff Thomas Akhil Oniha.
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
November 1, 2006IU DLP Brown Bag : Fall Data Integrity and Document- centric XML Using Schematron for Managing Text Collections Dazhi Jiao, Tamara.
ArcGIS Workflow Manager: Tasks and Enterprise Workflows Michael Broadbent.
Intro to the CS4240 Project Slides from Oct
1 Agile Roadmap and Portfolio by the xPMC Team AUGUST 26, 2015.
V | © OverDrive, Inc | Page 1 Demonstration: Library eBooks for Kindle Prepare for the eBook explosion by watching this short demonstration:
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
OWASP ESAPI SwingSet An introduction by Fabio Cerullo.
Exercise Your your Library ® RefWorks: Advanced November 21, 2006.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Application Summary  Web Application that allows its users to keep track of their exercises.  User has full control over what exercises are visible.
Security Development Life Cycle Baking Security into Development September 2010.
Qualities needed among science teachers- A perspective from Taiwan Huann-shyang Lin National Sun Yat-sen University, Taiwan.
Microsoft Management Seminar Series SMS 2003 Change Management.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
November 16th, 2015 Arrwa Mogalli Howe Elementary Strategy Groups.
C.A.G.I.S. Helpdesk System Sean Winfield March 6, 2006 Senior Design III.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
TRANSFORMING BUSINESS THROUGH INNOVATION Deal Management Solution Overview Adam J. Storch Vice President Business Solutions.
Getting Started with Datazen Microsoft’s New Mobile Dashboard Platform.
Top Benefits of Joomla in E- Learning. Flexibility - Because of Several Reasons Open Source Nature Create Custom Modules Custom Functionality To Your.
Image Credit: The student hat.
Risk Assessment AFFORDABLE SOLUTION USING E XCEL AND P OWER BI.
Web Services with Netbeans 6.0 Your Name Sun Campus Ambassador Your Address.
Advancing Workplace Technologies An MCCA Workshop presented by: Ed Weber, President Weber Enterprises, Inc. in association with: East Central College.
Matthias Rohr Practical Threat Modeling with Microsofts Threat Modeling Tool 2016.
Blood Bank Phạm Tiến Lập – SE02683 Nguyễn Sơn Hải – SE02879
Transition Your SharePoint Designer Workflows to Microsoft Flow
Fast App Creation with APEX Blueprints
رؤية مستقبلية لتطوير كلية الزراعة جامعة الفيوم
Threat Simulation & Modeling Training
New York Waterway Micah Bergdale Bytemark Inc., CEO New York City, NY.
دانشگاه شهیدرجایی تهران
Streamline Manual Testing Using Cordova Simulate
تعهدات مشتری در کنوانسیون بیع بین المللی
UNIVERSITY OF KHARTOUM Faculty of Mathematical Sciences
Herding Cats and Security Tools
What is a CMS. CMS is content management system CMS is a software that stores content.
Albeado - Enabling Smart Energy
Presentation transcript:

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 1 Application Threat Modeling Workshop PART III Threat Modeling Demo & Practice

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 2 Application Threat Modeling Workshop Threat Modeling Tools  Threat Modeling Analysis and Modeling (TAM) (Microsoft)  Pros: Flexible, Build in Threat & Attack Library  Cons: Not updated-supported, DFD require VISIO ™ installation  SDL Threat Modeling (Microsoft)  Pros: Integrated with SDL, Plug-in in issue tracking, free  Cons: Use STRIDE/DREAD not even used my Microsoft  Trike (open source)  Pros: Flexible, automatic threat generation  Cons: Not scalable, not maintained  PTA (commercial)  Pros: factor business impact of assets  Cons: User need to define threats, vulnerabilities and countermeasures Source :

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 3 Application Threat Modeling Workshop Threat Modeler Tool™ Demonstration 1.Threat Modeler live demo session with myAppSecurity Inc (20 minutes) 2.Develop your threat model con threatModeler ™ with PASTA™ (30 minutes)

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 4 Application Threat Modeling Workshop Threat Modeling Example : Mobile Payment Application

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 5 Application Threat Modeling Workshop Define Requirements

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 6 Application Threat Modeling Workshop Application Functional Decomposition

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 7 Application Threat Modeling Workshop Security-Design Assertion

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 8 Application Threat Modeling Workshop Threat Analysis

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 9 Application Threat Modeling Workshop Threat –Controls-Vulnerability Analysis at Component Level

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 10 Application Threat Modeling Workshop Vulnerability Analysis

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 11 Application Threat Modeling Workshop Attack-Threat Tree Modeling

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 12 Application Threat Modeling Workshop Risk Analysis And Management

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 13 Application Threat Modeling Workshop Q & Q U E S T I O N S A N S W E R S

November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 14 Application Threat Modeling Workshop Thanks for Your Attention me : Marco (dot) M (dot) Morana (at) Citi (dot) com Follow me on Preorder the book “Application Threat Modeling Book, Wiley-Blackwell” on Amazon Modeling-Marco-Morana/dp/