The National Defense Information Sharing and Analysis Center (ND-ISAC) is honored to announce that we will be offering an application threat modeling training series for our members. The ND-ISAC Application Security working group identified a subject matter expert to lead a training and discussion to further develop the content knowledge on application threat modeling. This 3-part series is targeting members that are Information Security Officers, Network Administrators, Software Engineers, IT Architects, and those looking to move into the AppSec field.
The objective of this training is to assess ND-ISAC member company security strategy prior to the implementation of an application in the technology infrastructure. The course enables attendees to identify threats/potential risks and optimize the security strategy to be implemented through the use of the STRIDE methodology.
Training will:
- Allow teams to use a “Shift-Left” approach and identify security threats during design
- Enable teams to prioritize remediation and security controls
- Enable teams to deliver secure software
- Help organizations save security associated costs
Below is a detailed outline of the ND-ISAC training series:
Training Day 1: February 3, 2021 5:00-6:00 PM EST
Introduction to Application Threat Modeling
|
Data Flow Diagram
|
Exercise #1 – Create a Data Flow Diagrams
|
Review Exercise #1
|
*Training Day 2: February 17, 2021 5:00-6:00 PM EST
Review Summary of Session #1
|
Identify Threat Vectors with STRIDE
|
Exercise #2 – Threat Vector Identification
|
Review Exercise #2
|
*We highly recommend members attend all three trainings, subsequent trainings #2 and #3 will require attendance of the prior training and build on the skills acquired from each meeting. We will record the trainings for those that cannot make all live events.
*Training Day 3: March 3, 2021 5:00-6:00 PM EST
Review Summary of Session #2
|
Rank Identified Threat Vectors
|
Exercise #3 – Threat Vector Ranking
|
Review Exercise #3
|
Mitigate Identified Threat Vectors
|
Exercise #4 – Map mitigation strategies
|
Application Threat Modeling Final Thoughts |
*We highly recommend members attend all three trainings, subsequent trainings #2 and #3 will require attendance of the prior training and build on the skills acquired from each meeting. We will record the trainings for those that cannot make all live events.
This is a TLP Green webinar and registration is open to ND-ISAC member companies only. If you are interested in participating in this training, e-mail info@ndisac.org for more information on registration.