Application Security Engineer in Bizzabo
threat modeling all the things . why do we need it. how to achieve it.
what if i tell you that security vulnerabilities could be find before the pen test and sometimes before coding the functionality. if it sounds interesting to you - please, visit my talk and get some new information about thread modeling process and it implementation in the company