Whiteboard hacking or threat modeling is the way to avoid risks in your applications upfront. This survival guide is a helpful companion through the different stages of threat modeling.
Our Survival Guide provides you with practical guidance and examples for threat modeling.
Step-by-step threat modeling
For beginners and advanced users.
We will help you, step by step, go through the minimal stages of threat modeling.
We will help you identify what you are building with data flow diagrams, discover threats with STRIDE, recommend standard mitigations and calculate risks of discovered design vulnerabilities.
Practical diagrams and visuals
Easy-to-use templates.
We offer easy-to-use templates for diagrams and frameworks to start with threat modeling.
An extension to our workshops
Combine the survival guide with hands-on training.
This survival guide is a useful companion during our whiteboard hacking workshops, that are all about getting you started with Whiteboard hacking or threat modeling as soon – and as effectively – as possible
Step-by-step Threat Modeling process
For beginners and advanced users.
We will help you, step by step, go through the minimal stages of threat modeling.
We will help you identify what you are building with data flow diagrams, discover threats with STRIDE, recommend standard mitigations and calculate risks of discovered design vulnerabilities.
Practical diagrams and visuals
Easy-to-use templates.
We offer easy-to-use templates for diagrams and frameworks to start with threat modeling.
An extension to our workshops
Combine the survival guide with hands-on training.
This survival guide is a useful companion during our whiteboard hacking workshops, that are all about getting you started with Whiteboard hacking or threat modeling as soon – and as effectively – as possible
Get your Survival Guide
We hope you can use this Survival Guide to improve your threat modeling practice.
Get your Survival Guide
We hope you can use this Survival Guide to improve your threat modeling practice.