Call us 24/7+62 21 8945 7057

Agile Threat Modeling

Inquiry Form

Mitigating Risks the Agile Way

Prior to conducting the training with your team, we’ll have an initial scoping meeting. This session is designed to customize the workshop to your specific requirements, helping us decide on the most suitable approach and focus areas to address your needs effectively.

Top-Down — Attack Scenario Approach

This approach is best suited for teams that are new to threat modeling and want to get started quickly, even in situations where not many details about the architecture are known. This approach is also best suited for teams that want to focus on the most important risks first, based on the most likely attack scenarios.

Bottom-Up — Dataflow Approach

This approach is best suited for teams that already have some experience with threat modeling and want to get a detailed view of the architecture, including all dataflows and their security properties. Focus is more on the architecture itself and less on the most likely attack scenarios. For this approach, usually more details about the architecture are required upfront.

Search for products

Back to Top
Product has been added to your cart