Threat Modelling: How Software Survives in a Hacker’s Universe Saskia Coplans

  • Locked
Saskia Coplans's profile
Saskia Coplans

Founder and Security Consultant

Threat Modelling: How Software Survives in a Hacker’s Universe Saskia Coplans image
Talk Description

This is the story of how a client lost millions due to a costly oversight that allowed attackers to exploit a devastating vulnerability. Although the client was aware that this weakness existed when the final product was launched, it would have been too expensive to fix and would have required them to miss critical deadlines.

In this talk, we'll discuss how with version 2, we helped our client by starting with some threat modelling techniques in order to understand; which assets an attacker would be after, what weaknesses existed in the design that would allow an attacker to access them, and what protections could be put in place to stop the same level of attack happening again.

 

Takeaways

  • How we can use threat modelling to think like an attacker
  • How threat modelling can help us secure our applications and how software testers can integrate this technique into the testing process
  • Why thinking about security as early as possible is the safest option

=

What you’ll learn

By the end of this talk, you'll be able to:

  • TBA
Saskia Coplans's profile'

Saskia Coplans

Founder and Security Consultant

Saskia is the Cofounder and Director of Digital Interruption and REXScan, and is the Director of Innovation for Data Science, AI and Cyber and HOST Salford. Saskia has over ten years experience in information security and governance along with standards and policy development. She has worked across Europe and Central Asia for Governments, NGO’s, Regulators and the Private Sector and presents at events and conferences world wide. She sits on the Greater Manchester Cyber Advisory Group, the Board of OWASP Manchester and the Infosec Hoppers and is a Copresenter on the Greyhats Podcast. 
Suggested Content
Testing Language Models With The Philosophy of Wittgenstein
Reviewing Requirements Documents
Usability Testing Guide & Benefits
30 Days of Security Testing
Exploring Security in Day-to-day Testing
99 Second Talks - Test.bash(); Manchester 2018
Get Out Of The Testing Game - Bill Matthews
Exploratory Testing: LIVE - Adam Howard
Continuous Performance Testing - Eric Proegler
Explore MoT
Episode One: The Companion
A free monthly virtual software testing community gathering
The Complete Guide To XPath
Learn how to create robust XPath selectors for your automation and much more...

Tags

  • security
  • analysis
  • models