SlideShare a Scribd company logo
To Be or Not To Be
Threat Modeling
in Security World
Speaker:
Mariusz Kondratowicz
2
Agenda
1. Dilemma
2. Project Management in Threat Modeling
3. Let’s make it SMART
4. Let’s make it FUN
5. Let’s make it VALUABLE
6. Let’s make it PRACTICAL
7. Let’s make it WORK
8. Five more extra hints
9. Q&A
3
To be... me
At first:
Sysadmin/NetOps
Then:
IT Security
And finally:
Compliance Manager
@ Opera Software
Currently:
Leading Threat Modeling
4
Dilemma
„ To be, or not to be, that is the question”
~Shakespeare
To be... more secure?
To be... involved in Security?
To be... slowed by Security?
To be... overwhelmed by Security?
Could be 
Threat Modeling
You
5
Project Management in TM
6
Golden Circle
7
Hint 1:
Realise who is your interlocutor!
8
WHO
9
SMART
10
Hint 2:
Make it fun!
11
Fun?
Threat Modeling.
Threat Modeling is a process.
Threat Modeling is for everyone!
Threat Modeling is not boring!
Nope.
12
Environment & Process
13
Support from Security Team
14
Assets
People
Data
Places
Devices
15
Threats
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege
16
Vulnerabilities
Software
Hardware
Physical
Psychological
17
Risks
Denial of Service
Information Disclosure
18
Mittigation
19
Risk Management vs Attacks&Impact
20
Hint 3:
Show the value!
21
Why?
• Map our risks
22
Why?
• Translate business risks into technical risks
23
Why?
• Organise and manage our risks
24
Why?
• Tool which could help you in security reviews
• Better than normal checklist
• Flexible
• Dynamic
• Support in planning new features
25
Why?
• Documentation
• Data Flows
• Compliance&Privacy
• PCI-DSS Compliance Requirement 12.2
26
Hint 4:
Understand their PoV!
27
Security cannot slow down dev!
28
Reuse good practices...
29
...but focus on details
30
Practical example
• Step 1: Understand new assets
• Step 2: Add dependency in right zone
• Step 3: Access list
• Step 4: Understand data flows
• Step 5: Impact on existing components
• Step 6: Identify risks
• Step 7: Mitigate/Accept risks
31
Hint 5:
Allow them to choice!
32
Approach - 1
33
DFD
34
Approach - 1
35
AFD
36
Approach - 1
37
Approach - 1
38
Approach - 1
39
Approach - 2
DFD + Weekly security sync-ups (risks here) + Progress + Plans + Discussion
40
Approach - 3
DFD + Triggers + Risk analysis
41
Approach - 4
DFD + Checklists + risk analysis + Discussion
42
Approach - 5
DFD + Checklists + optional risk analysis
43
Hint 6:
Ask and Listen!
44
Ask and Listen!
1. What are you expectations?
2. Which elements from T-M are the most interesting for you?
3. Which approach will be the best?
4. Where do we want to store DFD, risks?
5. Who should be involved in Threat Model?
6. Establish process to maintain T-M on regular basis.
7. Choose starting point.
8. What problems challenges do you see?
45
Hint 7:
Use it in different way!
46
Red Team & Blue Team
47
Hint 8:
Become Watchmaker!
48
Set your T-M
49
Hint 9:
Constantly improve!
50
Our Roadmap
1. Build good PR around Threat Modeling
2. Threat Modeling Training
3. Use Card Games in Threat Modeling
4. Monitor status
5. Constant feedback
51
Hint 10:
Find the Balance!
52
Speak
Proactive
Complex
Listen
Passive
Simple
53
Summarize
Hint 1: Realise who is your interlocutor!
Hint 2: Make it fun!
Hint 3: Show the value!
Hint 4: Understand their PoV!
Hint 5: Allow them to choice!
Hint 6: Ask and Listen!
Hint 7: Use it in different way!
Hint 8: Become Watchmaker!
Hint 9: Constantly improve!
Hint 10: Find the Balance!
„The rest is silence”*
*unless you have any questions 

More Related Content

PDF
Use our OWASP Threat Modeling Playbook to Improve your Product Security
Sebastien Deleersnyder
 
PPTX
BSidesSF talk: Overcoming obstacles in operationalizing security
Rafae Bhatti
 
PPTX
Injecting Threat Modeling into the SDLC by Susan Bradley
QA or the Highway
 
PPTX
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
Izar Tarandach
 
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
 
PDF
Threat Modeling workshop by Robert Hurlbut
DevSecCon
 
PDF
Synopsys Security Event Israel Presentation: Value Driven Threat Modeling
Synopsys Software Integrity Group
 
PDF
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
Synopsys Software Integrity Group
 
Use our OWASP Threat Modeling Playbook to Improve your Product Security
Sebastien Deleersnyder
 
BSidesSF talk: Overcoming obstacles in operationalizing security
Rafae Bhatti
 
Injecting Threat Modeling into the SDLC by Susan Bradley
QA or the Highway
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
Izar Tarandach
 
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
 
Threat Modeling workshop by Robert Hurlbut
DevSecCon
 
Synopsys Security Event Israel Presentation: Value Driven Threat Modeling
Synopsys Software Integrity Group
 
OWASP Chicago Meetup Presentation - Threat Modeling-Process Maturity
Synopsys Software Integrity Group
 

Similar to [Wroclaw #9] To be or Not To Be - Threat Modeling in Security World (20)

PPTX
[Hungary] I play Jack of Information Disclosure
OWASP EEE
 
PPT
13734729.ppt
AmitPandey388410
 
PDF
Treating Security Like a Product
VMware Tanzu
 
PDF
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Capgemini
 
PPTX
Threat modeling (Hacker Stories) workshop
Ty Sbano
 
PDF
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon
 
PDF
ch_2_Threat_Modeling_Risk_assessment.pdf
gajendra903637
 
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
Security Innovation
 
PPTX
OWASP SB -Threat modeling 101
Jozsef Ottucsak
 
PPTX
Security as a foundation
William Dunbar
 
PPTX
Threat Modeling Web Applications
Nadia BENCHIKHA
 
PDF
Building Security Teams
Astera Esther Schneeweisz
 
PPTX
Janitor vs cleaner
John Stauffacher
 
PDF
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
Juan Vicente Herrera Ruiz de Alejo
 
PPTX
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
DevOpsDays Tel Aviv
 
PDF
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 
PPTX
Making security champions in organization
kunwaratul hax0r
 
PPTX
Threat Modelling - Work Flow Process.pptx
datajr7
 
PDF
The Security Practitioner of the Future
Resolver Inc.
 
PPTX
Threat Modeling And Analysis
Lalit Kale
 
[Hungary] I play Jack of Information Disclosure
OWASP EEE
 
13734729.ppt
AmitPandey388410
 
Treating Security Like a Product
VMware Tanzu
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Capgemini
 
Threat modeling (Hacker Stories) workshop
Ty Sbano
 
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
DevSecCon
 
ch_2_Threat_Modeling_Risk_assessment.pdf
gajendra903637
 
Threat Modeling - Locking the Door to Vulnerabilities
Security Innovation
 
OWASP SB -Threat modeling 101
Jozsef Ottucsak
 
Security as a foundation
William Dunbar
 
Threat Modeling Web Applications
Nadia BENCHIKHA
 
Building Security Teams
Astera Esther Schneeweisz
 
Janitor vs cleaner
John Stauffacher
 
Practical Threat Modeling - WorldParty 2k23 HackMadrid.pdf
Juan Vicente Herrera Ruiz de Alejo
 
Value-driven threat modeling: Security by design - Avi Douglen - DevOpsDays T...
DevOpsDays Tel Aviv
 
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 
Making security champions in organization
kunwaratul hax0r
 
Threat Modelling - Work Flow Process.pptx
datajr7
 
The Security Practitioner of the Future
Resolver Inc.
 
Threat Modeling And Analysis
Lalit Kale
 
Ad

More from OWASP (20)

PDF
[OPD 2019] Web Apps vs Blockchain dApps
OWASP
 
PDF
[OPD 2019] Threat modeling at scale
OWASP
 
PDF
[OPD 2019] Life after pentest
OWASP
 
PDF
[OPD 2019] .NET Core Security
OWASP
 
PDF
[OPD 2019] Top 10 Security Facts of 2020
OWASP
 
PDF
[OPD 2019] Governance as a missing part of IT security architecture
OWASP
 
PDF
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
OWASP
 
PPTX
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
OWASP
 
PPTX
[OPD 2019] AST Platform and the importance of multi-layered application secu...
OWASP
 
PPTX
[OPD 2019] Inter-application vulnerabilities
OWASP
 
PDF
[OPD 2019] Automated Defense with Serverless computing
OWASP
 
PDF
[OPD 2019] Advanced Data Analysis in RegSOC
OWASP
 
PDF
[OPD 2019] Attacking JWT tokens
OWASP
 
PDF
[OPD 2019] Rumpkernels meet fuzzing
OWASP
 
PDF
[OPD 2019] Trusted types and the end of DOM XSS
OWASP
 
PDF
[Wroclaw #9] The purge - dealing with secrets in Opera Software
OWASP
 
PDF
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP
 
PDF
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP
 
PDF
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP
 
PDF
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
OWASP
 
[OPD 2019] Web Apps vs Blockchain dApps
OWASP
 
[OPD 2019] Threat modeling at scale
OWASP
 
[OPD 2019] Life after pentest
OWASP
 
[OPD 2019] .NET Core Security
OWASP
 
[OPD 2019] Top 10 Security Facts of 2020
OWASP
 
[OPD 2019] Governance as a missing part of IT security architecture
OWASP
 
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
OWASP
 
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
OWASP
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
OWASP
 
[OPD 2019] Inter-application vulnerabilities
OWASP
 
[OPD 2019] Automated Defense with Serverless computing
OWASP
 
[OPD 2019] Advanced Data Analysis in RegSOC
OWASP
 
[OPD 2019] Attacking JWT tokens
OWASP
 
[OPD 2019] Rumpkernels meet fuzzing
OWASP
 
[OPD 2019] Trusted types and the end of DOM XSS
OWASP
 
[Wroclaw #9] The purge - dealing with secrets in Opera Software
OWASP
 
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP
 
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP
 
OWASP Poland Day 2018 - Frans Rosen - Attacking modern web technologies
OWASP
 
Ad

Recently uploaded (20)

PPTX
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
PPTX
Parallel & Concurrent ...
yashpavasiya892
 
PPTX
AI ad its imp i military life read it ag
ShwetaBharti31
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
PDF
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PDF
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PPTX
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
PPTX
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
PDF
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
PPTX
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
PDF
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PPTX
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPTX
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
Parallel & Concurrent ...
yashpavasiya892
 
AI ad its imp i military life read it ag
ShwetaBharti31
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
How tech helps people in the modern era.
upadhyayaryan154
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 

[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World