OWASP Kyiv Winter 2022 ONLINE Meetup

threat modeling all the things . why do we need it. how to achieve it.
2022-02-26, 14:20–14:50, ZOOM

what if i tell you that security vulnerabilities could be find before the pen test and sometimes before coding the functionality. if it sounds interesting to you - please, visit my talk and get some new information about thread modeling process and it implementation in the company