Ali Yazdani
Real-world Threat Modeling
#1about 3 minutes
Why shift left security is crucial for modern development
High-cost bug bounties for production vulnerabilities demonstrate the need to integrate security earlier in the software development lifecycle.
#2about 2 minutes
What threat modeling is and where it fits in development
Threat modeling is a structured process to identify and mitigate security risks during the design phase, before coding begins.
#3about 3 minutes
Understanding core security concepts and their relationships
A clear definition of terms like weakness, vulnerability, attack, and risk helps to understand how threats exploit system weaknesses.
#4about 2 minutes
Introducing the six components of the STRIDE methodology
The STRIDE framework categorizes threats into six types: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.
#5about 3 minutes
Using data flow diagrams to apply the STRIDE model
The STRIDE workflow involves creating data flow diagrams (DFDs) and applying the six threat categories to each DFD element to identify potential issues.
#6about 2 minutes
Exploring four options for handling identified security threats
Once a threat is identified, it can be addressed by mitigating, eliminating, transferring, or formally accepting the associated risk.
#7about 2 minutes
Building a multi-level data flow diagram for an application
A practical example demonstrates how to build a data flow diagram for a ticketing system, starting from a high-level view and adding more detail in subsequent levels.
#8about 1 minute
How to define and use trust boundaries in threat modeling
Establishing clear trust boundaries within an application architecture is a critical first step for identifying where threats are most likely to cross.
#9about 4 minutes
Using OWASP Threat Dragon for practical threat modeling
The open-source tool OWASP Threat Dragon helps visualize the data flow diagram, identify threats for each component, and track mitigation plans.
Related jobs
Jobs that call for the skills explored in this talk.
VECTOR Informatik
Stuttgart, Germany
Senior
Java
IT Security
zeb consulting
Frankfurt am Main, Germany
Remote
Junior
Intermediate
Senior
Amazon Web Services (AWS)
Cloud Architecture
+1
Matching moments
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
01:15 MIN
Crypto crime, EU regulation, and working while you sleep
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
07:39 MIN
Prompt injection as an unsolved AI security problem
AI in the Open and in Browsers - Tarek Ziadé
03:14 MIN
Proactively managing the risks of employee personal branding
Leveraging Leaders’ Voices: The Business Power of Personal Branding
02:48 MIN
Building trust through honest developer advocacy
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
04:20 MIN
The most dangerous trap for HR during company growth
From Data Keeper to Culture Shaper: The Evolution of HR Across Growth Stages
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
Featured Partners
Related Videos
Security Pitfalls for Software Engineers
Jasmin Azemović
Organizational Change Through The Power Of Why - DevSecOps Enablement
Nazneen Rupawalla
Programming secure C#/.NET Applications: Dos & Don'ts
Sebastian Leuer
Simple Steps to Kill DevSec without Giving Up on Security
Isaac Evans
You can’t hack what you can’t see
Reto Kaeser
Real-World Security for Busy Developers
Kevin Lewis
You click, you lose: a practical look at VSCode's security
Thomas Chauchefoin & Paul Gerste
DevSecOps culture
Ali Yazdani
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Recorded Future's Insikt Group
Remote
Senior
Bash
Perl
Linux
Python
+2



Kummer Consulting
Berlin, Germany
Bash
Python
Burp Suite
Powershell
Scripting (Bash/Python/Go/Ruby)



NTT Data Deutschland SE
Erfurt, Germany
Remote
Java
Python
Node.js
Continuous Integration

NTT Data Deutschland SE
Erfurt, Germany
Remote
Java
Python
Node.js
Continuous Integration

Deloitte
Düsseldorf, Germany
Junior
Network Security
Microsoft Office
Agile Methodologies