Buy now

Have you purchased yours? Buy Your All-Access Pass now & get live and replays access!

Threat Modeling - O365 SaaS Provider

A talk by James Bore

Register to watch this content

By submitting your email you agree to the terms
Watch this content now

Tracks covered by this talk

About this talk

Threat modelling workshop applying various methodologies: STRIDE, LINDDUN, Attack Trees, and PnG, to a MSP organisation and its key system

This is the first section of a four-part exercise:

  • Part 1 - THIS SESSION Setting the scene to the further sessions. We will understand what is the company profile and the architecture of the company Threats and threat modeling of the company plus PNG (persona nan grata) profile

  • Part 2 - Incident Response Planning) - We will run through the scenario with a small group of people who will get the roles of key stakeholders at the actual incident response session (which will be the next part)

  • Part 3 - Incident Scenario Exercise - Actual exercise - 5 hours with breakout rooms for different groups of stakeholders. Run in sprints Information to be revealed throughout the exercise and groups work on their response

  • Part 4 - Post-mortem for the Part 3

Check our youtube channel for the sessions you have missed (search security incident open security summit).

See more details at this session page Open Security Summit website

Have you got yours yet?

Our All-Access Passes are a must if you want to get the most out of this event.

Check them out

Proudly supported by

Your logo could go here!

If you'd like to get your brand in front of attendees contact us.