Webinars

Register for upcoming live webinars or watch on-demand.
Discover the latest threat modeling thinking as well as useful tips & wider cyber security discussions.

Upcoming Live Webinars

On-Demand Webinars

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Diagram It
Diagram It: Business Continuity
In this session, we’ll examine multiple distinct representations of Business Continuity within threat models.
Watch Now
Diagram It
Diagram It: IoT
In this session, we’ll examine multiple distinct representations of IoT within threat models. Through comparative analysis, the strengths and weaknesses of each approach are scrutinized, facilitating informed decision-making in threat modeling processes.
Watch Now
Software Security
Future-Proofing Your Digital Assets: A Secure-by-Design Strategy
Cybersecurity threats are increasingly sophisticated, posing significant challenges for organizations striving to protect their assets and sensitive information. The need to build secure software, and identify vulnerabilities as early as possible, is needed now more than ever.
Watch Now
Standards, Compliance and Regulations
Der EU Cyber Resilience Act kommt. Hole dir deinen "oven-ready" Plan
Das EU-Gesetz zur Cyber-Resilienz steht bevor, und es ist unumgänglich, sich damit auseinanderzusetzen. Hier sind einige Schritte, die Sie ergreifen können.
Watch Now
AI & ML
Usable AI and Meaningful Threat Modeling
An engaging fireside discussion exploring the transformative impact of generative models and AI on threat modeling, while also showing some sneak previews of our AI capability in an exclusive demo.
Watch Now
Diagram It
Diagram It: Enhancing Threat Modeling Through Effective Representation - A Focus on APIs
Representing complex systems accurately is often a daunting task in threat modeling.
Watch Now
Project Elevate
Project Elevate - Episode 2: Understanding Workflows
Looking for a greater understanding of the possibilities of workflows? Join this session where we will share the ways workflows can be used.
Watch Now
Project Elevate
Project Elevate - Episode 3: Customizing Content (components)
Customize your content, in particular for components, assets, and trust zones. This will enable you to create better threat model diagrams which truly represent your architecture.
Watch Now
Project Elevate
Project Elevate - Episode 4: Utilizing Integrations
Here we show you how to make the most of your integrations, including the ease with which you can link us to your issue trackers for efficient risk mitigation and prioritization.
Watch Now