Take a look at our downloads
Whitepaper remote operations
Read about some use cases of remote access to ICS/OT environments and learn what could go wrong if these environments are too accessible.
Product sheet Software builders
Download our product sheet on how to get a better grip on your cybersecurity as a software builders and learn more about our methodology.
Product sheet Identity and Endpoint protection
Start assessing your Identity & Endpoint maturity, define your priorities and empower your security defenders with best practices to keep one step ahead.
Product sheet Cloud Information Protection and Compliance
Protecting and governing important data is more challenging than ever. Download our product sheet to learn how to improve the management of important data.
Whitepaper Threat modeling done right
Threat modeling is an essential step in the development of your application. Without it, your protection is a shot in the dark. Discover in our whitepaper how to do threat modeling right.
Whitepaper Cybersecurity Trends 2020
As security specialists at Toreon, we identified the four important trends you should be focusing on in 2020.
Whitepaper Medical Device Threat Modeling
This whitepaper describes Threat Modeling in the context of creating secure medical device systems.
Threat Modeling Playbook
This playbook provides the main steps to establish a threat modeling practice for every type of organization or development team, regardless of your size and maturity level.
Whiteboard Hacking Survival Guide
This survival guide is a companion to our whiteboard hacking trainings. The guide provides you with practical guidance and examples that you can rely on when starting your threat modeling workshops.