Agile Threat Modeling

Meetup Agenda: Agile Threat Modeling - 2 Hours


Theme: Integrating Security into Your Agile Sprints


Welcome Participants: Developers, Testers, Product Owners, Security Enthusiasts


Duration: 2 Hours (9:00 AM to 11:00 AM)


Location: HCDS Technologies Gurugram


Goal: To provide a practical understanding of agile threat modeling and equip attendees with the skills to integrate it into their agile workflows.


Agenda:


(9:00 - 9:15) Welcome & Introductions (15 Minutes)


Welcome & Icebreaker (5 minutes):


Brief welcome message.


Quick round of introductions (name, role, experience with threat modeling/agile).


"What's one security question you've always wanted answered?" (Quick sharing).


Agenda Overview & Goals (5 minutes):


Outline the agenda and expected outcomes.


Emphasize the importance of agile threat modeling.


Setting the Stage: Agile & Security (5 minutes):


Brief discussion on the challenges of integrating security into agile.


Highlight the benefits of proactive threat modeling.


(9:15 - 9:45) Agile Threat Modeling Fundamentals (30 Minutes)


What is Threat Modeling? (10 minutes):


Definition and core concepts.


Explanation of common threat modeling methodologies (STRIDE, PASTA, etc.).


Why it matters in agile.


Integrating Threat Modeling into Agile (15 minutes):


How threat modeling fits into sprints and iterations.


Roles and responsibilities in agile threat modeling.


Practical examples of incorporating threat modeling into sprint planning, backlog refinement, and retrospectives.


Tools & Techniques Overview (5 minutes):


Brief introduction to common threat modeling tools (OWASP Threat Dragon, Microsoft Threat Modeling Tool).


Overview of data flow diagrams and attack trees.


(9:45 - 10:30) Practical Workshop: Threat Modeling a User Story (45 Minutes)


Scenario Introduction (5 minutes):


Present a simplified user story (e.g., "As a user, I want to be able to reset my password").


Explain the context and assumptions.


Group Formation (5 minutes):


Divide attendees into small groups (4-5 people).


Threat Modeling Activity (25 minutes):


Each group will perform a simplified threat modeling exercise using the provided user story.


Groups can use a simplified version of STRIDE or draw a simple data flow diagram.


Identify potential threats and vulnerabilities.


Discuss potential mitigation strategies.


Group Presentations & Discussion (10 minutes):


Each group briefly presents their findings.


Facilitated discussion on common threats and effective mitigation strategies.


(10:30 - 10:50) Automating & Scaling Agile Threat Modeling (20 Minutes)


Automation Opportunities (10 minutes):


Discuss how to automate parts of the threat modeling process (e.g., using security tools and integrations).


Examples of automated security testing and code analysis.


Scaling Threat Modeling (10 minutes):


Strategies for scaling threat modeling across multiple teams and projects.


Building a security-conscious culture.


Using threat libraries to speed up the process.


(10:50 - 11:00) Q&A, Wrap-up & Networking (10 Minutes)


Open Q&A (5 minutes):


Address any remaining questions from the audience.


Wrap-up & Key Takeaways (3 minutes):


Summarize the key learnings from the meetup.


Provide resources for further learning.


Networking (2 minutes):


Encourage attendees to connect and network.


Thank you and goodbye.

Register Now