Webinars

Register for upcoming live webinars or watch on-demand.
Discover the latest threat modeling thinking as well as useful tips & wider cyber security discussions.

Upcoming Live Webinars

On-Demand Webinars

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
AI & ML
Using LLMs Securely
Most likely, LLM applications are popping up in your organization like mushrooms after a Spring rain. What can you do to control security risk? Who should do what work? And how should they do it? Join our upcoming webinar with Dr Gary McGraw, Co-founder of the Berryville Institute of Machine Learning (BIML) to hear about LLM-related risks and controls.
Watch Now
Intro to Threat Modeling
Threat Modeling Series 1 - Setting the Scene
We are delighted to bring you a brand new series, aimed at supporting your threat modeling journey with tangible and achievable milestones. This six-part series begins with ‘Setting the Scene’ where John Taylor, and guest speaker, Adam Shostack, will give you tactical advice and frameworks to set off on your threat modeling program on your very best foot…
Watch Now
AI & ML
AI-augmented threat modeling, and groundbreaking product enhancements
In this session, we will cover our many product improvements, including our biggest announcement of AI-augmented threat modeling, Jeff.
Watch Now
AI & ML
AI Prompt Engineering and Secure Architecture
Join us for an enlightening session as we bring together esteemed experts to explore the intricacies of AI Prompt Engineering for Secure Architecture.
Watch Now
Diagram It
Diagram It: SaaS Applications
In this session, we’ll examine multiple distinct representations of SaaS Applications within threat models. Through comparative analysis, the strengths and weaknesses of each approach are scrutinized, facilitating informed decision-making in threat modeling processes.
Watch Now
Diagram It
Business Continuity
In this session, we’ll examine multiple distinct representations of Business Continuity within threat models.
Watch Now
Diagram It
Diagram It: IoT
In this session, we’ll examine multiple distinct representations of IoT within threat models. Through comparative analysis, the strengths and weaknesses of each approach are scrutinized, facilitating informed decision-making in threat modeling processes.
Watch Now
Software Security
Future-Proofing Your Digital Assets: A Secure-by-Design Strategy
Cybersecurity threats are increasingly sophisticated, posing significant challenges for organizations striving to protect their assets and sensitive information. The need to build secure software, and identify vulnerabilities as early as possible, is needed now more than ever.
Watch Now
Standards, Compliance and Regulations
Der EU Cyber Resilience Act kommt. Hole dir deinen "oven-ready" Plan
Das EU-Gesetz zur Cyber-Resilienz steht bevor, und es ist unumgänglich, sich damit auseinanderzusetzen. Hier sind einige Schritte, die Sie ergreifen können.
Watch Now