{"id":5973,"date":"2026-01-09T10:16:22","date_gmt":"2026-01-09T10:16:22","guid":{"rendered":"https:\/\/ptkim.co.id\/?post_type=product&#038;p=5973"},"modified":"2026-01-12T08:30:07","modified_gmt":"2026-01-12T08:30:07","slug":"agile-threat-modeling","status":"publish","type":"product","link":"https:\/\/ptkim.co.id\/id\/product\/agile-threat-modeling\/","title":{"rendered":"Agile Threat Modeling"},"content":{"rendered":"<h3 id=\"mitigating-risks-the-agile-way\">Mitigating Risks the Agile Way<\/h3>\n<p><em>Prior to conducting the training with your team, we\u2019ll have an initial scoping meeting. This session is designed to customize the workshop to your specific requirements, helping us decide on the most suitable approach and focus areas to address your needs effectively.<\/em><\/p>\n<p><strong>Top-Down \u2014 Attack Scenario Approach<\/strong><\/p>\n<p>This approach is best suited for teams that are new to threat modeling and want to get started quickly, even in situations where not many details about the architecture are known. This approach is also best suited for teams that want to focus on the most important risks first, based on the most likely attack scenarios.<\/p>\n<p><strong>Bottom-Up \u2014 Dataflow Approach<\/strong><\/p>\n<p>This approach is best suited for teams that already have some experience with threat modeling and want to get a detailed view of the architecture, including all dataflows and their security properties. Focus is more on the architecture itself and less on the most likely attack scenarios. For this approach, usually more details about the architecture are required upfront.<\/p>","protected":false},"excerpt":{"rendered":"<p>Mitigating Risks the Agile Way Prior to conducting the training with your team, we\u2019ll have an initial scoping meeting. This session is designed to customize the workshop to your specific requirements, helping us decide on the most suitable approach and focus areas to address your needs effectively. Top-Down \u2014 Attack Scenario Approach This approach is [&hellip;]<\/p>","protected":false},"featured_media":5986,"template":"","meta":[],"product_cat":[382],"product_tag":[],"class_list":["post-5973","product","type-product","status-publish","has-post-thumbnail","hentry","product_cat-cyber-security","ts_product_brand-christian-schneider"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Agile Threat Modeling - KIM<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptkim.co.id\/id\/product\/agile-threat-modeling\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agile Threat Modeling - KIM\" \/>\n<meta property=\"og:description\" content=\"Mitigating Risks the Agile Way Prior to conducting the training with your team, we\u2019ll have an initial scoping meeting. This session is designed to customize the workshop to your specific requirements, helping us decide on the most suitable approach and focus areas to address your needs effectively. Top-Down \u2014 Attack Scenario Approach This approach is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptkim.co.id\/id\/product\/agile-threat-modeling\/\" \/>\n<meta property=\"og:site_name\" content=\"KIM\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T08:30:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptkim.co.id\/wp-content\/uploads\/2026\/01\/attack-tree-200.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"218\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/\",\"url\":\"https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/\",\"name\":\"Agile Threat Modeling - KIM\",\"isPartOf\":{\"@id\":\"https:\/\/ptkim.co.id\/#website\"},\"datePublished\":\"2026-01-09T10:16:22+00:00\",\"dateModified\":\"2026-01-12T08:30:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptkim.co.id\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/ptkim.co.id\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Agile Threat Modeling\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptkim.co.id\/#website\",\"url\":\"https:\/\/ptkim.co.id\/\",\"name\":\"KIM\",\"description\":\"PT KIM\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptkim.co.id\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"id\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Agile Threat Modeling - KIM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptkim.co.id\/id\/product\/agile-threat-modeling\/","og_locale":"id_ID","og_type":"article","og_title":"Agile Threat Modeling - KIM","og_description":"Mitigating Risks the Agile Way Prior to conducting the training with your team, we\u2019ll have an initial scoping meeting. This session is designed to customize the workshop to your specific requirements, helping us decide on the most suitable approach and focus areas to address your needs effectively. Top-Down \u2014 Attack Scenario Approach This approach is [&hellip;]","og_url":"https:\/\/ptkim.co.id\/id\/product\/agile-threat-modeling\/","og_site_name":"KIM","article_modified_time":"2026-01-12T08:30:07+00:00","og_image":[{"width":200,"height":218,"url":"https:\/\/ptkim.co.id\/wp-content\/uploads\/2026\/01\/attack-tree-200.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimasi waktu membaca":"1 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/","url":"https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/","name":"Agile Threat Modeling - KIM","isPartOf":{"@id":"https:\/\/ptkim.co.id\/#website"},"datePublished":"2026-01-09T10:16:22+00:00","dateModified":"2026-01-12T08:30:07+00:00","breadcrumb":{"@id":"https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ptkim.co.id\/product\/agile-threat-modeling\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptkim.co.id\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/ptkim.co.id\/shop\/"},{"@type":"ListItem","position":3,"name":"Agile Threat Modeling"}]},{"@type":"WebSite","@id":"https:\/\/ptkim.co.id\/#website","url":"https:\/\/ptkim.co.id\/","name":"KIM","description":"PT KIM","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptkim.co.id\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"id"}]}},"_links":{"self":[{"href":"https:\/\/ptkim.co.id\/id\/wp-json\/wp\/v2\/product\/5973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptkim.co.id\/id\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/ptkim.co.id\/id\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptkim.co.id\/id\/wp-json\/wp\/v2\/media\/5986"}],"wp:attachment":[{"href":"https:\/\/ptkim.co.id\/id\/wp-json\/wp\/v2\/media?parent=5973"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/ptkim.co.id\/id\/wp-json\/wp\/v2\/product_cat?post=5973"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/ptkim.co.id\/id\/wp-json\/wp\/v2\/product_tag?post=5973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}