Join our June Tech Meetup Webinar

Threat modeling - a game-changer for organizations, we will look into application security and fully automated security assessments for AWS architectures

foreseeti welcomes Developers, Vulnerability Managers and CISO’s to this webinar about automated threat modelling to support DevSecOps and continuous risk management

Agenda:

15:00 - 16:30 CET - June Cyber Security Tech Sessions:

Fully automated security assessments in AWS architectures
How to manage and deploy automated security assessments at scale in AWS architectures.
∙ The role of Automated Threat Modeling and Attack Simulations in AWS
∙ What are the key challenges addressed, and wins with automated security assessments?
∙ How does it work in practice?
∙ How can teams collaborate and work together for the best result?
Speakers:
Paul Ahlgren, Regional Leader, Security & Compliance Business Acceleration, Nordics & Baltics, Amazon Web Services (AWS)

Erik Ringdahl, Product Director, foreseeti

Application threat modeling, a banking application example
Public facing applications are often used as entry points for intrusions and malicious activity. But what opportunities an attacker is offered once the foothold is achieved depends on the internal structure of the systems and services of the application.
∙ How to create a threat model based on the different parts of an application and how they interact
∙ How securiCAD will present expected attacker operations
∙ How attack simulations can visualize security gaps
∙ Using the banking application example as a threat modeling template
Speaker: Joar Jacobsson, IT Security Consultant & Tutor, foreseeti

Why threat modelling is a game-changer for organizations
It remains accepted that asset management is the crucial foundation for any security program. You can’t protect what you don’t know you have. However, it remains an Achilles heel for many organizations to understand not only their assets and associated infrastructure in a static model, but increasingly every organization is going through a level of digital transformation. Organizations now have more complex and integrated networks than ever before, added to which is added partial network and point solution security coverage. Complexity is the enemy of security, and innovative technologies such as threat modelling can significantly help organizations lessen the noise and provide clarity of risk across their infrastructure. They are also able to model different architectural security designs that can support gaps in the security network and support business case investment.

Join Mo Ahddoud as he gives his industry perspective on:
∙ How threat modelling can support many of the key challenges facing security teams
∙ How to use automated threat modelling to support DevSecOps and continuous risk management and help mitigate these challenges
Mo Ahddoud, Interim CISO & Cyber Security Consultant, MA Consulting LTD

When:

Date & time: 4th of June at 15:00 - 16:30 CET

For whom:

  • Developers: Do you want/need to assess the cyber security of your cloud implementations?
    This seminar is for you.
  • Vulnerability Managers: Do you want to find out which are the most critical vulnerabilities in your clouds to address?
    This seminar is for you.
  • CISO’s: Do you want to equip your organization so that you can continuously assess and quantify the cyber risk exposure of your cloud environment and take proactive action where it matters most.
    This seminar is for you.

(After the webinar all attendees will receive the presentations and videos of the sessions by email.)

Sign up

Fill in your details