SlideShare a Scribd company logo
Threat Modeling 101
Safety First
DAN HARDIKER | CTO | @ADAPTAVIST | @DHARDIKER
Threat Modeling 101
https://cwatch.comodo.com/images-new/website-security-software.png
https://www.colocationamerica.com/images/ip-lookup-location.jpg
https://images.techhive.com/images/article/2016/06/box-of-chocolates-100664145-primary.idge.jpg
47.9%
https://wwwen.uni.lu/university/news/latest_news/social_engineering_password_in_exchange_for_chocolate
What is Security about?
MINDSET
http://www.ofmonksandmen.com/?p=268
STORYTELLING
KEY CONCEPTS
KEY CONCEPTS
KEY CONCEPTS
‣ Confidentiality
KEY CONCEPTS
‣ Confidentiality
‣ Integrity
KEY CONCEPTS
‣ Confidentiality
‣ Integrity
‣ Availability
KEY CONCEPTS
‣ Confidentiality
‣ Integrity
‣ Availability
KEY CONCEPTS
https://www.pinterest.co.uk/pin/256423772505109414/
FRAMEWORKS & STANDARDS
27001
27018
Threat Modeling 101
Threat Modeling 101
http://www.freeimageslive.co.uk/free_stock_image/color-blocks-jpg
ASSETS
ASSETS
ASSETS
ASSETS
ASSETS
ASSETS
ASSETS
ATTACKERS
ATTACKERS
https://www.kissclipart.com/hacker-clipart-security-hacker-clip-art-fnyrw5/
ATTACKERS
https://www.kissclipart.com/hacker-clipart-security-hacker-clip-art-fnyrw5/
ATTACKERS
https://www.kissclipart.com/hacker-clipart-security-hacker-clip-art-fnyrw5/
ATTACKERS
https://www.kissclipart.com/hacker-clipart-security-hacker-clip-art-fnyrw5/
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
ATTACK VECTORS
The consideration of unwanted
access to assets by attackers
using attack vectors.
THREAT MAP
Batman
Example #1
Bruce Wayne / Batman’s Threat Model
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
CONTROLS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
CONTROLS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
ENCRYPTION
CONTROLS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
ENCRYPTION
HIDE LOCATION
CONTROLS
Bruce Wayne / Batman’s Threat Model
ASSETS
@
E-MAILS
TEXTS
BAT CAVE
ALFRED
ATTACKERS
POLICE
PRESS
JOURNALISTS
THE JOKER
LOW RISK
MED RISK
HIGH RISK
VECTORS
ENCRYPTION
HIDE LOCATION
SECURITY SYSTEM
My First Models
Generic / Server / Cloud
GENERIC ORGANISATION
GENERIC ORGANISATION
DIGITAL ASSETS PHYSICAL ASSETS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
DOCUMENTS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
DOCUMENTS LAPTOPS
SERVERS
PHONES
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
VULNERABILITY
SCANNERS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
WEB CRAWLERS
VULNERABILITY
SCANNERS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
WEB CRAWLERS
VULNERABILITY
SCANNERS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
CORPORATE
ESPIONAGE
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
CORPORATE
ESPIONAGE
DATA
HARVESTING
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
CORPORATE
ESPIONAGE
DATA
HARVESTING
RANSOMWARE
GENERIC ORGANISATION
DIGITAL ASSETS
@
E-MAILS
SLACK
PHYSICAL ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
DOCUMENTS LAPTOPS
SERVERS
PHONES
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
CORPORATE
ESPIONAGE
DATA
HARVESTING
RANSOMWARE
BOTNETS
SERVER APP
SERVER APP
ASSETS
SERVER APP
ASSETS
VERSION
CONTROL
SERVER APP
ASSETS
VERSION
CONTROL
CI / CD
SERVER APP
ASSETS
VERSION
CONTROL
CI / CD
RELEASE
REPOSITORY
SERVER APP
ASSETS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERS
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
SERVER APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
MALWARE PAYLOAD
SERVER APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
DATA HARVESTING
@
MAILING LIST
ANALYTICS
VERSION
CONTROL
CI / CD
MARKETPLACE
RELEASE
REPOSITORY
MALWARE PAYLOAD
CLOUD APP
CLOUD APP
ASSETS
CLOUD APP
ASSETS
INFRA AS CODE
PIPELINE
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
DATABASES
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
DATABASES
EXECUTION
ENVIRONMENTS
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
DATABASES
EXECUTION
ENVIRONMENTS
DEV / TEST
ENVIRONMENTS
CLOUD APP
ASSETS
ARTIFACT
REPOSITORIES
INFRA AS CODE
PIPELINE
BACKUPS / DRDATABASES
EXECUTION
ENVIRONMENTS
DEV / TEST
ENVIRONMENTS
CLOUD APP
ASSETS
UNTARGETED
ATTACKERS
TARGETED
ATTACKERSMOTIVATION
STAFF
(INCOMPETENCE)
STAFF
(ESPIONAGE)
NATION STATE
WEB CRAWLERS
VULNERABILITY
SCANNERS
SCRIPT KIDDIES
DATA HARVESTING
ARTIFACT
REPOSITORIES
MALWARE PAYLOAD
INFRA AS CODE
PIPELINE
BACKUPS / DRDATABASES
EXECUTION
ENVIRONMENTS
DEV / TEST
ENVIRONMENTS
If you only remember 3 things …
… things I said while you were sleeping
3 THINGS TO REMEMBER
1. Security is not an after thought. It’s Job Zero!
3 THINGS TO REMEMBER
1. Security is not an after thought. It’s Job Zero!
2. Threat Model as part of User Stories.
3 THINGS TO REMEMBER
1. Security is not an after thought. It’s Job Zero!
2. Threat Model as part of User Stories.
3. Ignorant humans are your biggest threat.
3 THINGS TO REMEMBER
Threat Modeling 101
Threat Modeling 101
‣ Ars Technica
‣ Schneier on Security
‣ The Hacker News
‣ OWASP
FURTHER READING
FURTHER READING
https://www.amazon.co.uk/Threat-Modeling-Designing-Adam-Shostack/dp/1118809998
JUST DON’T FORGET…
https://xkcd.com/538/
DAN HARDIKER | CTO | @ADAPTAVIST | @DHARDIKER
Thank you!

More Related Content

PDF
Vulnerability Management
asherad
 
PDF
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
SlideTeam
 
PPTX
Security Information and Event Management (SIEM)
k33a
 
PPTX
Security engineering
OWASP Indonesia Chapter
 
PDF
Cybersecurity Risk Quantification
Matthew Karnas
 
PDF
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
PDF
IBM Qradar & resilient
Prime Infoserv
 
PPTX
Information Technology Disaster Planning
guest340570
 
Vulnerability Management
asherad
 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
SlideTeam
 
Security Information and Event Management (SIEM)
k33a
 
Security engineering
OWASP Indonesia Chapter
 
Cybersecurity Risk Quantification
Matthew Karnas
 
NIST Cybersecurity Framework 101
Erick Kish, U.S. Commercial Service
 
IBM Qradar & resilient
Prime Infoserv
 
Information Technology Disaster Planning
guest340570
 

What's hot (20)

PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
PPTX
Security Awareness Training.pptx
MohammedYaseen638128
 
PPTX
Cybersecurity
A. Shamel
 
PPTX
Cybersecurity Awareness Training
Dave Monahan
 
PDF
Information Security Awareness Training
Randy Bowman
 
PPSX
Security Awareness Training
William Mann
 
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
PPTX
Siem ppt
kmehul
 
PDF
Secure Coding and Threat Modeling
Miriam Celi, CISSP, GISP, MSCS, MBA
 
PDF
Cyber Threat Intelligence
ZaiffiEhsan
 
PPTX
Information Security and the SDLC
BDPA Charlotte - Information Technology Thought Leaders
 
PPTX
Sensitive Data Exposure
abodiford
 
PDF
Security Awareness Training
Daniel P Wallace
 
PDF
Cyber Security and Cloud Computing
Keet Sugathadasa
 
PDF
Threat Modeling Everything
Anne Oikarinen
 
PPTX
SIEM - Your Complete IT Security Arsenal
ManageEngine EventLog Analyzer
 
PPTX
IBM Q-radar security intelligence roadmap
DATA SECURITY SOLUTIONS
 
PDF
Cybersecurity risk management 101
Srinivasan Vanamali
 
PPT
Basics of Information System Security
chauhankapil
 
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Security Awareness Training.pptx
MohammedYaseen638128
 
Cybersecurity
A. Shamel
 
Cybersecurity Awareness Training
Dave Monahan
 
Information Security Awareness Training
Randy Bowman
 
Security Awareness Training
William Mann
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Siem ppt
kmehul
 
Secure Coding and Threat Modeling
Miriam Celi, CISSP, GISP, MSCS, MBA
 
Cyber Threat Intelligence
ZaiffiEhsan
 
Sensitive Data Exposure
abodiford
 
Security Awareness Training
Daniel P Wallace
 
Cyber Security and Cloud Computing
Keet Sugathadasa
 
Threat Modeling Everything
Anne Oikarinen
 
SIEM - Your Complete IT Security Arsenal
ManageEngine EventLog Analyzer
 
IBM Q-radar security intelligence roadmap
DATA SECURITY SOLUTIONS
 
Cybersecurity risk management 101
Srinivasan Vanamali
 
Basics of Information System Security
chauhankapil
 
Ad

Similar to Threat Modeling 101 (20)

PPT
Threats to data and information security
John LEE
 
PPTX
Information Security BY DR.NURUL HUDA NIK ZULKIPLI VISITING LECTURER FROM UNI...
GaluhPt
 
PPT
2.4.1 - Intro to Cyber Security for students.ppt
rameshselvarajkkp
 
PPT
Rainer+3e Student Pp Ts Ch03
kbzdox ivanovich
 
PPTX
(2016_01_20)_IS_Management_Basics_LinkedIn
Ian Naumenko, CISSP, CRISC
 
PPTX
Personal Threat Models
Geoffrey Vaughan
 
PPT
Security information for internet and security
Somesh Kumar
 
PPT
IT-Security-20210426203847.ppt
Ian Dave Balatbat
 
PPT
IT-Security-20210426203847.ppt
ssuser6c59cb
 
PPT
IT-Security Assessment for IT assets.ppt
santoshsahu190428
 
PPT
IT-Security-20210426203847.ppt
RamaNingaiah
 
PPT
Security Of Information Assets and why it matters.ppt
hellasassin
 
PPT
IT-Security Awareness and Training session
sameerroushan
 
PPT
InfoSecConcepts.ppt
MobileAntitheft
 
PPT
Introduction To Ethical Hacking
chakrekevin
 
PPTX
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
DataExchangeAgency
 
PPTX
Introduction to Incident Response Management
Don Caeiro
 
PPT
Threats
sbmiller87
 
PDF
foundation of security: computer program and security
ShifadShaji
 
PPTX
Date security introduction
Leo Mark Villar
 
Threats to data and information security
John LEE
 
Information Security BY DR.NURUL HUDA NIK ZULKIPLI VISITING LECTURER FROM UNI...
GaluhPt
 
2.4.1 - Intro to Cyber Security for students.ppt
rameshselvarajkkp
 
Rainer+3e Student Pp Ts Ch03
kbzdox ivanovich
 
(2016_01_20)_IS_Management_Basics_LinkedIn
Ian Naumenko, CISSP, CRISC
 
Personal Threat Models
Geoffrey Vaughan
 
Security information for internet and security
Somesh Kumar
 
IT-Security-20210426203847.ppt
Ian Dave Balatbat
 
IT-Security-20210426203847.ppt
ssuser6c59cb
 
IT-Security Assessment for IT assets.ppt
santoshsahu190428
 
IT-Security-20210426203847.ppt
RamaNingaiah
 
Security Of Information Assets and why it matters.ppt
hellasassin
 
IT-Security Awareness and Training session
sameerroushan
 
InfoSecConcepts.ppt
MobileAntitheft
 
Introduction To Ethical Hacking
chakrekevin
 
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
DataExchangeAgency
 
Introduction to Incident Response Management
Don Caeiro
 
Threats
sbmiller87
 
foundation of security: computer program and security
ShifadShaji
 
Date security introduction
Leo Mark Villar
 
Ad

More from Atlassian (20)

PPTX
International Women's Day 2020
Atlassian
 
PDF
10 emerging trends that will unbreak your workplace in 2020
Atlassian
 
PDF
Forge App Showcase
Atlassian
 
PDF
Let's Build an Editor Macro with Forge UI
Atlassian
 
PDF
Meet the Forge Runtime
Atlassian
 
PDF
Forge UI: A New Way to Customize the Atlassian User Experience
Atlassian
 
PDF
Take Action with Forge Triggers
Atlassian
 
PDF
Observability and Troubleshooting in Forge
Atlassian
 
PDF
Trusted by Default: The Forge Security & Privacy Model
Atlassian
 
PDF
Designing Forge UI: A Story of Designing an App UI System
Atlassian
 
PDF
Forge: Under the Hood
Atlassian
 
PDF
Access to User Activities - Activity Platform APIs
Atlassian
 
PDF
Design Your Next App with the Atlassian Vendor Sketch Plugin
Atlassian
 
PDF
Tear Up Your Roadmap and Get Out of the Building
Atlassian
 
PDF
Nailing Measurement: a Framework for Measuring Metrics that Matter
Atlassian
 
PDF
Building Apps With Color Blind Users in Mind
Atlassian
 
PDF
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...
Atlassian
 
PDF
Beyond Diversity: A Guide to Building Balanced Teams
Atlassian
 
PDF
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed Team
Atlassian
 
PDF
Building Apps With Enterprise in Mind
Atlassian
 
International Women's Day 2020
Atlassian
 
10 emerging trends that will unbreak your workplace in 2020
Atlassian
 
Forge App Showcase
Atlassian
 
Let's Build an Editor Macro with Forge UI
Atlassian
 
Meet the Forge Runtime
Atlassian
 
Forge UI: A New Way to Customize the Atlassian User Experience
Atlassian
 
Take Action with Forge Triggers
Atlassian
 
Observability and Troubleshooting in Forge
Atlassian
 
Trusted by Default: The Forge Security & Privacy Model
Atlassian
 
Designing Forge UI: A Story of Designing an App UI System
Atlassian
 
Forge: Under the Hood
Atlassian
 
Access to User Activities - Activity Platform APIs
Atlassian
 
Design Your Next App with the Atlassian Vendor Sketch Plugin
Atlassian
 
Tear Up Your Roadmap and Get Out of the Building
Atlassian
 
Nailing Measurement: a Framework for Measuring Metrics that Matter
Atlassian
 
Building Apps With Color Blind Users in Mind
Atlassian
 
Creating Inclusive Experiences: Balancing Personality and Accessibility in UX...
Atlassian
 
Beyond Diversity: A Guide to Building Balanced Teams
Atlassian
 
The Road(map) to Las Vegas - The Story of an Emerging Self-Managed Team
Atlassian
 
Building Apps With Enterprise in Mind
Atlassian
 

Recently uploaded (20)

PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Software Development Methodologies in 2025
KodekX
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 

Threat Modeling 101