Download presentation
Presentation is loading. Please wait.
Published byDavion Roades Modified over 9 years ago
1
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 1 Application Threat Modeling Workshop PART III Threat Modeling Demo & Practice
2
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 2 Application Threat Modeling Workshop Threat Modeling Tools Threat Modeling Analysis and Modeling (TAM) (Microsoft) Pros: Flexible, Build in Threat & Attack Library Cons: Not updated-supported, DFD require VISIO ™ installation SDL Threat Modeling (Microsoft) Pros: Integrated with SDL, Plug-in in issue tracking, free Cons: Use STRIDE/DREAD not even used my Microsoft Trike (open source) Pros: Flexible, automatic threat generation Cons: Not scalable, not maintained PTA (commercial) Pros: factor business impact of assets Cons: User need to define threats, vulnerabilities and countermeasures Source : http://www.net-security.org/dl/insecure/INSECURE-Mag-17.pdf
3
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 3 Application Threat Modeling Workshop Threat Modeler Tool™ Demonstration 1.Threat Modeler live demo session with myAppSecurity Inc (20 minutes) 2.Develop your threat model con threatModeler ™ with PASTA™ (30 minutes) https://www.youtube.com/watch?v=OZSjS8nu6kE
4
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 4 Application Threat Modeling Workshop Threat Modeling Example : Mobile Payment Application
5
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 5 Application Threat Modeling Workshop Define Requirements
6
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 6 Application Threat Modeling Workshop Application Functional Decomposition
7
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 7 Application Threat Modeling Workshop Security-Design Assertion
8
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 8 Application Threat Modeling Workshop Threat Analysis
9
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 9 Application Threat Modeling Workshop Threat –Controls-Vulnerability Analysis at Component Level
10
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 10 Application Threat Modeling Workshop Vulnerability Analysis
11
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 11 Application Threat Modeling Workshop Attack-Threat Tree Modeling
12
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 12 Application Threat Modeling Workshop Risk Analysis And Management
13
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 13 Application Threat Modeling Workshop Q & Q U E S T I O N S A N S W E R S
14
November 7°-8° - Belfast & Dublin- ISACA Ireland Chapters 14 Application Threat Modeling Workshop Thanks for Your Attention Email me : Marco (dot) M (dot) Morana (at) Citi (dot) com Follow me on twitter:@threatmodeling Preorder the book “Application Threat Modeling Book, Wiley-Blackwell” on Amazon http://www.amazon.co.uk/Application-Threat- Modeling-Marco-Morana/dp/0470500964
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.