How to build a successful threat modeling program: Episode 3 - Driving Adoption

Описание к видео How to build a successful threat modeling program: Episode 3 - Driving Adoption

The third installment in this six-part series focuses on ‘Driving Adoption’ when launching a threat modeling program. Join John Taylor of Deloitte, and guest speaker, Robert Hurlbut of Aquia, where they will share practical advice on what you should consider to maximize adoption success and buy-in. Have you considered existing processes? Are there integrations already in place that the threat modeling program should link or contribute to? What other things will support you to get teams utilizing this new program? John and Robert are ready to tell you their views, based upon years of rolling out threat modeling initiatives.

Next Sessions/Past Sessions:
Threat Modeling Series 1 - Setting the Scene: https://www.iriusrisk.com/webinars/ho...
Threat Modeling Series 2 - Building Foundations: https://www.iriusrisk.com/webinars/ho...
Threat Modeling Series 3 - Driving Adoption :https://www.iriusrisk.com/webinars/th...
Threat Modeling Series 4 - Driving your Program : https://www.iriusrisk.com/webinars/th...
Threat Modeling Series 5 - Did we do a good job? : https://www.iriusrisk.com/webinars/th...
Threat Modeling Series 6 - Delivering Value : https://www.iriusrisk.com/webinars/th...


Speakers:
1 - Presenter: John Taylor - Information security leader focused on delivering security ready applications
Linkedin:   / johntaylorcissp  
2 - Presenter: Robert Hurlbut
Principal Application Security Architect and Threat Modeling Lead

Video Sections:
0:00 Introduction and Welcome
2:03 Series Structure and Expectations Overview
4:39 Recap of Previous Session: Foundations of Threat Modeling Programs
6:24 Drivers of Threat Modeling Adoption
9:01 Challenges in Driving Adoption: Time and Regulatory Aspects
12:45 Starting Small: Grassroots Approach and Building Support
18:04 Integrating Threat Modeling into Existing Processes
21:27 Finding the Right Place for Threat Modeling in SDLC
26:15 Collaborating with Teams: Using Existing Diagrams and Documentation
31:07 Cross-Team Collaboration Benefits and Early Security Measures
36:42 Incorporating Outputs into Product Backlogs
41:02 Leveraging Security Champions for Threat Modeling Success
46:40 Technology and Tooling: Manual vs. Automated Approaches
52:26 Tooling Impact and Key Considerations
56:04 Key Takeaways and Next Session Preview

#threatmodeling #processes #trainingmodels #collaboration #securitychampions

Комментарии

Информация по комментариям в разработке