Advanced Whiteboard Hacking — aka hands-on Threat Modeling

In this edition Toreon enhanced the section on privacy by design, compliance, and added a section on threat modeling medical devices. All participants get Toreon’s Threat Modeling Playbook plus one-year access to their online threat modeling learning platform. As part of this training, you will be asked to create your own threat model, on which you will get individual feedback. One month after the training Toreon organize an online review session with all the participants.

This course has been cancelled.

This product is currently out of stock and unavailable.

 

Presented By: Sebastien Deleersnyder (Toreon)

In this edition Toreon enhanced the section on privacy by design, compliance, and added a section on threat modeling medical devices. All participants get Toreon’s Threat Modeling Playbook plus one-year access to their online threat modeling learning platform. As part of this training, you will be asked to create your own threat model, on which you will get individual feedback. One month after the training Toreon organize an online review session with all the participants.

As highly skilled professionals with years of experience under their belts, Toreon are intimately familiar with the gap between academic knowledge of threat modeling and real-world practice. To minimize that gap, they have developed practical use cases, based on real-life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model.

Using this methodology for the hands-on workshops they provide their students with a challenging training experience and the templates to incorporate threat modeling best practices in their daily work. Students will be challenged in groups of 3 to 4 people to perform the different stages of threat modeling on the following:

  • Diagramming web and mobile applications, sharing the same REST backend
  • Threat modeling an IoT gateway with a cloud-based update service
  • Get into the defender’s head — modeling points of attack against a nuclear facility
  • Threat mitigations of OAuth scenarios for an HR application
  • Privacy analysis of a new face recognition system in an airport

After each hands-on workshop, the results are discussed, and students receive a documented solution. Based on Toreon’s successful trainings in the last years and the great and positive feedback, they released this updated threat modeling training at Global AppSec San Francisco 2022.

  • Software developers
  • Security and system architects
  • System managers
  • Security professionals

Before attending this course, students should be familiar with basic knowledge of web and mobile Applications, databases & Single sign on (SSO) principles.

Threat modeling introduction

  • Threat modeling in a secure development lifecycle
  • What is threat modeling?
  • Why perform threat modeling?
  • Threat modeling stages
  • Different threat modeling methodologies
  • Document a threat model

Diagrams – what are you building?

  • Understanding context
  • Doomsday scenarios
  • Data flow diagrams
  • Trust boundaries
  • Sequence and state diagrams
  • Advanced diagrams
  • Hands-on: diagramming web and mobile applications, sharing the same REST backend

Identifying threats – what can go wrong?

  • STRIDE introduction
  • Spoofing threats
  • Tampering threats
  • Repudiation threats
  • Information disclosure threats
  • Denial of service threats
  • Elevation of privilege threats
  • Attack trees
  • Attack libraries
  • Hands-on: STRIDE analysis of an Internet of Things (IoT) gateway and cloud update service

Addressing each threat

  • Mitigation patterns
  • Authentication: mitigating spoofing
  • Integrity: mitigating tampering
  • Non-repudiation: mitigating repudiation
  • Confidentiality: mitigating information disclosure
  • Availability: mitigating denial of service
  • Authorization: mitigating elevation of privilege
  • Specialist mitigations
  • Hands-on: threat mitigations OAuth scenarios for web and mobile applications

Threat modeling and compliance

  • How to marry threat modeling with compliance
  • GDPR and Privacy by design
  • Privacy threats
  • LINDUNN and Mitigating privacy threats
  • Threat modeling medical devices (ISO14971)
  • Threat modeling Industrial Control Systems (IEC 62443)
  • Threat Assessment and Remediation Analysis for automotive (TARA, SAE 21434)
  • Mapping threat modeling on compliance frameworks
  • Hands-on: privacy threat modeling of a face recognition system in an airport

Penetration testing based on offensive threat models

  • Create pentest cases for threat mitigation features
  • Pentest planning to exploit security design flaws
  • Vulnerabilities as input to plan and scope security testing
  • Prioritization of pentesting based on risk rating
  • Hands-on: get into the defender’s head – modeling points of attack of a nuclear facility.

Advanced threat modeling

  • Typical steps and variations
  • Validation threat models
  • Effective threat model workshops
  • Communicating threat models
  • Agile and DevOps threat modeling
  • Improving your practice with the Threat Modeling Playbook
  • Scaling up threat modeling
  • Threat modeling and compliance: ISO14971 (medical devices), IEC 62443 (industrial cybersecurity), SAE 21434 (automotive)
  • Threat models examples: medical devices, automotive, industrial control systems, IoT and Cloud

Threat modeling resources

  • Open-Source tools
  • Commercial tools
  • General tools
  • Threat modeling tools compared

Examination

  • Hands-on examination
  • Grading and certification

Review session (online session after 1 month)

  • Hand-in of your own threat model
  • Individual feedback on your threat model
  • Review session

Your bonus training package includes:

  • Following a successful exam (passing grade defined at 70%): Threat Modeling Practitioner certificate
  • One year of access to our threat modeling e-learning platform
  • Presentation handouts
  • Tailored use case worksheets
  • Detailed use case solution descriptions
  • Threat model documentation template
  • Template for calculating identified threat risk severity
  • Threat modeling playbook
  • STRIDE mapped on compliance standards

As highly skilled professionals with years of experience under our belts, Toreon are intimately familiar with the gap between academic knowledge of threat modeling and real-world practice.

To minimize that gap they have developed practical Use Cases, based on real life projects. Each use case includes a description of the environment, together with questions and templates to build a threat model. Using this methodology for the hands on workshops they provide their students with a robust training experience and the templates to incorporate threat modeling best practices in their daily work.

The students will be challenged to perform the threat modeling in groups of 3 to 4 people performing the different stages of threat modeling on:

  • B2B web and mobile applications, sharing the same REST backend
  • An Internet of Things (IoT) deployment with an on premise gateway and secure update service
  • OAuth scenarios for mobile and web applications
  • privacy impact assessment of a face recognition system in an airport

After each hands-on workshop, the results are discussed, and the students receive a documented solution.

  • The students should bring their own laptop to the course.

Sebastien Deleersnyder led engagements in the domain of ICT-security, Web and Mobile Security with several customers in the private and public sector. Sebastien is the Belgian OWASP Chapter Leader, served as vice-chair of the global OWASP Foundation Board and performed several public presentations on Web Application, Mobile and Web Services Security. Furthermore, Sebastien co-founded the yearly BruCON conference.

The two-day course will take place at the Novotel London West on 12–13 September 2022.

This course has been cancelled.

The price is £1,680 (inc VAT/£1,400 ex VAT).

You can purchase a ticket at a discounted rate for 44CON 2023 at the same time as your training course. The conference will take place on 13th September in the evening and 14–15 September at the Novotel London West, London. If you want to purchase a pre-order t-shirt and/or accommodation with the conference ticket, please email registration@44con.com.

A ticket for the training does not include accommodation.

Conference and training tickets are non-refundable as per our Terms of Service.

This ticket is NOT transferable (i.e. you cannot use it one day and pass it to someone the other — you can however change the name on it if circumstances change and you can’t attend).