Scroll to discover
Watch a Demo
Skip to content

The Four Steps to Threat Modeling

In this webinar with Adam Shostack and Jonny Tennyson, we address what the 4 steps to threat modeling are and how to scale them at enterprise level.

In this webinar with Adam Shostack and Jonny Tennyson, we address what the 4 steps to threat modeling are and how to scale them at enterprise level. 
Threat Modeling is ways of understanding, identifying and mitigating security, privacy and similar issues in a system. It is ideal for security engineers, software architects, and developers as it will help them in shaping every system they build and defend.

The 4 steps to Threat Modeling: 

  • What are we building? 
  • What are we going to do about it?
  • What can go wrong?
  • Did we do a good job?