UsefulLinks
Computer Science
Cybersecurity
Threat Modeling
1. Introduction to Threat Modeling
2. The Threat Modeling Process Overview
3. System Decomposition and Modeling
4. Threat Identification and Enumeration
5. Threat Analysis and Risk Assessment
6. Validation and Verification
7. Integrating Threat Modeling into the Development Lifecycle
8. Domain-Specific Threat Modeling
9. Tooling and Automation
10. Scaling a Threat Modeling Program
10.
Scaling a Threat Modeling Program
10.1.
Creating a Center of Excellence
10.1.1.
Governance Structures
10.1.2.
Best Practice Sharing
10.1.3.
Standards Development
10.2.
Training and Evangelism
10.2.1.
Training Programs
10.2.1.1.
Basic Threat Modeling Training
10.2.1.2.
Advanced Techniques
10.2.2.
Awareness Campaigns
10.2.3.
Building Security Culture
10.3.
Developing Templates and Playbooks
10.3.1.
Standardized Processes
10.3.2.
Reusable Artifacts
10.3.3.
Common Threat Libraries
10.4.
Metrics and Program Management
10.4.1.
Program Maturity Assessment
10.4.2.
Success Metrics
10.4.3.
Continuous Improvement
Previous
9. Tooling and Automation
Go to top
Back to Start
1. Introduction to Threat Modeling