Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Topic
Threat Modeling talks at BSides
201 talks tagged
Threat Modeling
from 61 chapters of BSides events worldwide.
Related topics
Technical
Methodology
Talk
Purple
Intermediary
Blue
28:41
Measuring Cybersecurity Maturity with the NIST CSF
Josh Sokol
BSides Vancouver
· 2021
Technical
GRC
Threat Modeling
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2021-06
46:38
How to 10X Your Company's Security (Without a Series D)
Clint Gibler
BSidesSF
· 2020
Technical
Cloud IAM
DevSecOps
Threat Modeling
Blue
Talk
Open →
2020-03
47:45
John Heasman - Doing More in AppSec by Doing Less
John Heasman
BSides Knoxville
Technical
Threat Modeling
Web AppSec
Blue
Methodology
Talk
Open →
2024-09
43:40
Building Sustainable Security Programs
Astha Singhal
BSidesSF
· 2022
Career
Career & Soft Skills
Threat Modeling
Keynote
Open →
2022-07
13:24
MITRE D3FEND
James Gibbins
BSides London
· 2022
Technical
Detection Engineering
Threat Modeling
Intro
Blue
Talk
Open →
2022-01
20:12
Attack of the Graph: Visual Tools for Cyber Analysis
Christian Miles
BSides Vancouver
· 2021
Technical
Threat Intel
Threat Modeling
Vulnerability Research
Talk
Open →
2021-06
1:01:06
Spear Phishing - Jak Się Bronić? Case Studies
Borys Łącki
BSides Warsaw
· 2018
Technical
Social Engineering
Threat Modeling
Red
Talk
Open →
2018-10
29:35
LSASS - What should we be doing?
Robert Wilson
BSides Augusta
· 2021
Technical
Active Directory
Threat Modeling
Intermediary
Blue
Talk
Open →
2021-10
42:30
Crash all the Flying Things! — Exploiting and Defending Aircraft Collision Avoidance
Joe Greenwood
BSides London
· 2015
Technical
Hardware Hacking
Threat Modeling
Vulnerability Research
Advanced
Red
Technical Deep-dives
Talk
Open →
2015-07
38:25
How to Stop Worrying & Build a Modern Detection & Response Program
Allyn Stott
BSides Berlin
· 2023
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Methodology
Talk
Open →
2024-01
33:30
MITRE D3FEND and How to Master It
Saba Bagheri
BSides Sydney
· 2025
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2025-02
33:42
Assessing the Embedded Devices On Your Network
David Tomaschik
BSidesSF
· 2017
Technical
Hardware Hacking
IoT
Threat Modeling
Red
Talk
Open →
2017-03
48:34
Using DeTT&CT and the MITRE ATT&CK Framework to Assess Your Security Posture
David Branscome
BSides Knoxville
· 2022
Technical
Detection Engineering
Threat Modeling
Intermediary
Blue
Demo
Talk
Open →
2022-05
39:37
Lessons Learned While Building a Privacy Operations Center at Headspace Health
Shobhit Mehta
BSidesSF
· 2023
Policy
Technical
GRC
Privacy
Threat Modeling
Talk
Open →
2023-05
41:49
Prioritising your security work using MITRE ATT&CK
Floris Ladan
BSides Tallinn
· 2022
Technical
Detection Engineering
Threat Intel
Threat Modeling
Intermediary
Blue
Talk
Open →
2022-10
45:48
One Technique, Two Techniques, Red Technique, Blue Technique: Operationalizing MITRE ATT&CK
Jamie Williams
Daniel Weiss
BSides DC 2018
Technical
Detection Engineering
Threat Intel
Threat Modeling
Talk
Open →
2018-11
59:16
Facing the Kobayashi Maru: Incident Response Tabletop Exercises
JC
BSides SLC
· 2017
Technical
Threat Modeling
Blue
Talk
Open →
2017-06
24:24
One Search To Rule Them All: Threat Modelling AI Search
Kane Narraway
BSidesSF
· 2025
Technical
AI Security
Cloud IAM
Threat Modeling
Talk
Open →
2025-06
43:47
Secure Designs, UX Dragons, Vuln Dungeons
Mike Shema
Kalyani Pawar
Jack Cable
BSidesSF
· 2025
Technical
Threat Modeling
Web AppSec
Panel
Open →
2025-06
25:15
Inside Cloud Attack Paths: End-to-End Adversary Simulation
Mauricio Velazco
BSides NYC
· 2025
Technical
Cloud IAM
Threat Modeling
Blue
Red
Talk
Open →
2025-11
13:54
MITRE ATLAS: Exploring AI Vulnerabilities
Arthur Frost
BSides London
· 2025
Technical
AI Security
Threat Modeling
Case Studies and Incidents Analysis
Talk
Open →
2025-02
33:15
Keynote: Winning the AI Race: Verifiability is All You Need
Sergej Epp
BSides Frankfurt
· 2025
Technical
AI Security
Detection Engineering
Threat Modeling
Technical Deep-dives
Keynote
Open →
2025-12
40:03
Securing Generative AI: Is it all an Illusion?
Rachana Doshi
Michael Samson
BSidesSF
· 2024
Technical
AI Security
Threat Modeling
Vulnerability Research
Talk
Open →
2024-07
50:19
Planning Effective Red Team Exercises
Sean T. Malone
BSidesSF
· 2016
Technical
Threat Modeling
Red
Talk
Open →
2016-04
32:40
For Crying Out Cloud - Stu Hirst and Tash Norris
Stu Hirst
Tash Norris
BSides Munich
· 2019
Technical
Cloud IAM
DevSecOps
Threat Modeling
Blue
Talk
Open →
2019-03
54:20
How To Fit Threat Modelling Into Continuous Security
Irene Michlin
BSides Lisbon
· 2019
Technical
Threat Modeling
Intermediary
Talk
Open →
2019-12
55:33
Using MITRE D3FEND to Defend Against Cyber Threats
Jacek Grymuza
Kacper Zariczny
BSides Warsaw
· 2024
Technical
Detection Engineering
Network Security
Threat Modeling
Blue
Talk
Open →
2024-07
44:29
0xDEAD: Domain Exploitation and Domination
Jon Milkins
Bsides CT
· 2025
Technical
Active Directory
Threat Modeling
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2025-12
21:10
What I learned about security working minimum wage at Hollywood Video
Ben Schmerler
BSidesSF
· 2023
Career
Physical Security
Threat Modeling
Intro
Talk
Open →
2023-05
54:23
Forecasting Cyber Attacks
Charlene Deaver-Vazquez
BSides Charm
· 2022
Technical
Threat Intel
Threat Modeling
Methodology
Technical Deep-dives
Talk
Open →
2022-07
58:06
Digital Separation: Reclaiming Your Data Post-Relationship and Implementing Risk-Based OPSEC
April Wright
BSides Boston
Technical
Privacy
Social Engineering
Threat Modeling
Intro
Talk
Open →
2021-02
35:12
Using BloodHound as a Defender: Tips from the Red Team
Andrew McNicol
BSides Charm
· 2024
Technical
Active Directory
Detection Engineering
Threat Modeling
Blue
Talk
Open →
2024-06
43:16
Testing Endpoint Security Solutions with Atomic Red Team
BSides Asheville
· 2018
Technical
Detection Engineering
Threat Modeling
Intermediary
Blue
Purple
Methodology
Demo
Open →
2019-03
23:03
The Little Phone That Could Ch-ch-chroot
Mathew Evans
Jack Whitter-Jones
BSides London
· 2019
Technical
DFIR
Mobile Security
Threat Modeling
Advanced
Red
Talk
Open →
2019-06
16:26
Red Teaming On Critical Infrastructure
Granit Beka
BSides London
· 2025
Technical
Critical Infrastructure
Threat Modeling
Red
Talk
Open →
2024-02
50:37
Enemy Within: Leveraging Purple Teams for Advanced Threat Detection & Prevention
Jayson Grace
Adam Bradbury
BSides Las Vegas
· 2023
Technical
Detection Engineering
Threat Intel
Threat Modeling
Purple
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2023-10
29:35
How I Learned to Stop Worrying and Build a Modern Detection & Response Program
Allyn Stott
BSides Toronto
· 2023
Technical
Detection Engineering
Threat Modeling
Blue
Methodology
Talk
Open →
2023-11
24:48
Threat Model The World
Ciaran Conliffe
BSides Belfast
· 2018
Technical
Threat Modeling
Talk
Open →
2018-10
38:46
You Don't Have to Patch!
Jasvir Nagra
Pedro Fortuna
BSides Lisbon
· 2023
Technical
DevSecOps
Threat Modeling
Web AppSec
Intermediary
Talk
Open →
2024-02
24:38
Cloudy With a Chance of Purple Rain: Leveraging Stratus Red Team to Secure Your Clouds
Luciano Avendano
BSides PDX
· 2022
Technical
Cloud IAM
Detection Engineering
Threat Modeling
Purple
Demo
Talk
Open →
2022-10
45:34
Purple Teaming Cloud Identity Simulation Labs for Red and Blue teams
Jason Ostrom
BSides Dallas/Fort Worth
· 2022
Technical
Cloud IAM
Detection Engineering
Threat Modeling
Purple
Technical Deep-dives
Demo
Talk
Open →
2022-11
44:52
Threat Modeling: Intro for Security Architecture
Brennan Crowe
BSides Dallas/Fort Worth
· 2024
Technical
Threat Modeling
Intro
Purple
Talk
Open →
2025-01
22:32
PG - Intel-Driven Adversary Simulation for A Holistic Approach to Cybersecurity
Carlos Gonçalves
BSides Las Vegas
· 2024
Technical
Threat Intel
Threat Modeling
Purple
Case Studies and Incidents Analysis
Talk
Open →
2024-09
28:09
My CI/CD Pipeline Contains All Security Tools Available! Now What...?
Jasmin Mair
BSides Munich
Technical
DevSecOps
Supply Chain Security
Threat Modeling
Talk
Open →
2023-10
13:01
Purple Team Assessment
Iliyan Velikov
BSides Sofia
· 2023
Technical
Threat Intel
Threat Modeling
Purple
Talk
Open →
2023-03
26:57
Threat Modelling for Detection and Response
Misha Yalavarthy
BSides Berlin
· 2021
Technical
Detection Engineering
Threat Modeling
Blue
Talk
Open →
2021-09
50:47
Sure, Let Business Users Build Their Own. What Could Go Wrong?
Michael Bargury
BSidesSF
· 2023
Technical
Cloud IAM
DevSecOps
Threat Modeling
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2023-05
20:43
Advanced Threat Modeling with GenAI
Vladimir Fedotov
BSides Philly
· 2023
Technical
AI Security
Threat Modeling
Talk
Open →
2024-01
30:09
Keeping Electric Vehicles Secure: The Need For A CAN Security Framework
Sivaranjani Sankaralingam
BSides Munich
· 2022
Technical
Detection Engineering
Hardware Hacking
Threat Modeling
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2022-05
46:39
Kyle Howson: How to build a Security Operations program
Kyle Howson
BSides Calgary
· 2020
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Talk
Open →
2020-12
49:14
I Heart My Robot Overlords: Infosec Challenges in Emerging Technologies
Dan Klinedinst
BSides Peru
· 2016
Research
AI Security
IoT
Threat Modeling
Vulnerability Research
Methodology
Technical Deep-dives
Talk
Open →
2016-06
18:04
Using Deep Learning to Undermine Tor
Matt Wright
BSidesROC
· 2019
Research
AI Security
Privacy
Threat Modeling
Technical Deep-dives
Talk
Open →
2019-03
32:57
Network Segmentation Security: Responder, NAT, and Segmentation Bypass
Anthony Holt
BSides Newcastle
· 2025
Technical
Network Security
Threat Modeling
Red
Technical Deep-dives
Talk
Open →
2025-02
18:55
4000 Holes in Blackburn, Lancashire: Defence at Scale
Glen Pegden
BSides Liverpool
Technical
Threat Modeling
Vulnerability Research
Talk
Open →
2022-01
28:27
Stakeholder-Specific Vulnerability Categorization: CVSS Alternative
Kwadwo Burgee
BSides NoVa
· 2021
Policy
Threat Modeling
Vulnerability Research
Talk
Open →
2021-06
31:55
Watching the Watchers: Exploiting Vulnerable Monitoring Solutions
Rock Stevens
Matt Hand
BSides Las Vegas
· 2022
Technical
AI Security
Detection Engineering
Threat Modeling
Talk
Open →
2022-09
56:17
What Would the CISO Do (WWCD) — How to Build a Security Strategy
Helen Patton
BSides Knoxville
· 2021
Career
GRC
Threat Modeling
Talk
Open →
2021-05
39:35
Just Because It's Crazy Doesn't Make It Wrong: Bringing Your Hacker POV to the Election
BSides Dallas/Fort Worth
· 2021
Policy
OSINT
Threat Modeling
Intermediary
Talk
Open →
2021-11
42:39
Lies, More Lies, and Ransomware Statistics
Dennis Underwood
BSides Peru
· 2021
Threat Intel
Threat Modeling
Talk
Open →
2021-10
43:55
Where and how to implement Security in Software Development
Radostina Kondakova
Jordan Popov
BSides Sofia
· 2022
Technical
DevSecOps
Threat Modeling
Web AppSec
Methodology
Talk
Open →
2022-04
39:08
Building A Modern, Scalable and Effective Application Security Program
Abdessamad Temmar
BSides Prishtina
· 2024
Technical
AI Security
DevSecOps
OWASP
Threat Modeling
Case Studies and Incidents Analysis
Talk
Open →
2024-09
52:37
Josh Sokol: Measuring Cybersecurity Maturity with the NIST CSF
Josh Sokol
BSides Calgary
· 2021
Technical
GRC
Threat Modeling
Talk
Open →
2021-12
33:12
A Journey To Zero Trust
Joshua Danielson
Brittany Little
Dileep Gurazada
BSides Las Vegas
· 2021
Technical
Cloud IAM
Threat Modeling
Blue
Talk
Open →
2021-08
38:43
Cloud Attack: Dissecting Attack Paths with Graph-Mode
Filipi Pires
BSides Las Vegas
· 2024
Technical
Cloud IAM
Threat Modeling
Vulnerability Research
Red
Talk
Open →
2024-09
48:03
Collecting Threat Data using Distributed Deception
Michael Edie
BSides Augusta
· 2022
Technical
Malware Analysis
Threat Intel
Threat Modeling
Case Studies and Incidents Analysis
Empirical Research
Talk
Open →
2022-10
22:48
Measuring Cyber Defense With The MITRE Framework
Marcus Osterloh
BSides Munich
· 2022
Technical
Detection Engineering
Threat Modeling
Talk
Open →
2022-05
57:19
The Proxy Warfare: Unmasking Russian and Chinese Externalized Cyber Capabilities
Alixia Rutayisire
BSides Frankfurt
· 2025
Research
Threat Intel
Threat Modeling
Open →
2025-12
21:29
Bow Ties in Infosec: Do They Have a Place?
Carolyn Yates
BSides Manchester
· 2017
Technical
Threat Modeling
Talk
Open →
2017-08
28:07
A Better Way to Threat Matrix
Cody Martin
BSides Augusta
· 2021
Technical
Threat Intel
Threat Modeling
Demo
Talk
Open →
2021-10
26:59
Adversary Emulation for Everyone!
Cristian Di Bartolomeo
Todd Brecher
BSides Toronto
· 2023
Technical
Detection Engineering
Threat Intel
Threat Modeling
Intro
Purple
Demo
Talk
Open →
2023-11
56:48
Best Practices for Software Supply Chain Risk Assessments
Dick Brooks
Bsides CT
· 2020
Technical
Supply Chain Security
Threat Modeling
Vulnerability Research
Talk
Open →
2020-11
35:05
Scaling the Security Wall: Agile Threat Modeling for Complex Systems
Vineeth Sai Narajala
BSides Charm
· 2024
Technical
Cloud IAM
DevSecOps
Threat Modeling
Methodology
Talk
Open →
2024-06
22:11
Screaming About Detection Coverage in ALLCAPS
Evan Perotti
BSides Philly
· 2025
Technical
Detection Engineering
Threat Modeling
Purple
Empirical Research
Methodology
Talk
Open →
2026-02
20:33
Purple Team: How This Color Can Help You And Your Organisation Learn and Get Better
Patrick Mathieu
BSides Las Vegas
· 2017
Technical
Detection Engineering
Threat Modeling
Purple
Talk
Open →
2017-09
22:49
Decision Analysis Applications in Threat Analysis Frameworks
Emily Shawgo
BSides Las Vegas
· 2018
Research
Threat Intel
Threat Modeling
Intermediary
Talk
Open →
2018-09
43:43
GT - Cognitive Security and Social Engineering: A Systems-Based Approach
Matthew Canham
Ben D. Sawyer
BSides Las Vegas
· 2023
Community
Technical
AI Security
Social Engineering
Threat Modeling
Methodology
Technical Deep-dives
Talk
Open →
2023-10
54:41
Delivering Control Assurance Through Purple Teaming
Carlos Rodriguez
Ben Finke
BSides Charlotte
· 2022
Technical
Detection Engineering
Threat Modeling
Purple
Talk
Open →
2022-09
18:39
Emerging Cyber Trends
Gergana Winzer
BSides Sydney
GRC
Threat Intel
Threat Modeling
Intro
Keynote
Open →
2023-05
54:17
Make Better Risk Decisions to Prevent Future Cyber Attacks
Nathan Wenzler
BSides Charm
· 2023
Technical
Threat Modeling
Vulnerability Research
Talk
Open →
2023-05
48:34
Understanding the Modern Attack: A Review of the Adversary's Operational Lifecycle
Jason Rivera
BSides Vancouver
· 2022
Technical
Detection Engineering
Threat Intel
Threat Modeling
Case Studies and Incidents Analysis
Methodology
Talk
Open →
2022-07
29:05
Threat Modeling Meets Model Training: Web App Security Skills for AI
Breanne Boland
BSidesSF
· 2025
Technical
AI Security
Threat Modeling
Web AppSec
Talk
Open →
2025-10
24:24
Robust Defense for the Rest of Us
Russell Mosley
BSides Las Vegas
· 2017
Technical
Detection Engineering
Network Security
Threat Modeling
Blue
Talk
Open →
2017-08
51:54
Del CVE al CEO: Cómo Hacer que la Alta Dirección Escuche a los Hackers
BSides CDMX
· 2025
Technical
GRC
Threat Modeling
Vulnerability Research
Intermediary
Methodology
Talk
Open →
2025-07
53:00
Systems Thinking for Security
Eleanor Saitta
BSides Vancouver
· 2022
Technical
Threat Modeling
Keynote
Open →
2022-07
44:05
Cybersecurity for Space Systems
Milenko Starcik
BSides Frankfurt
· 2024
Technical
Satellite Technology
Threat Modeling
Vulnerability Research
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2025-06
25:52
Easy Mode Deception Technology Deployments at Scale
Sasha Levy
BSides PDX
· 2023
Technical
Detection Engineering
Threat Modeling
Blue
Talk
Open →
2023-10
1:09:02
Playing at Security: Building and Running Incident Response Tabletop Scenarios
James Bore
BSides Newcastle
· 2020
Career
Technical
Career & Soft Skills
Threat Modeling
Workshop
Open →
2020-09
46:49
Becoming Cybersecurity Bilingual to Build an Effective Detection Program
John Dwyer
BSides Peru
· 2024
Career
Technical
Detection Engineering
Threat Intel
Threat Modeling
Talk
Open →
2024-08
20:26
Stop the Leak! Adversarial Thinking in Cybersecurity with PRE-ATT&CK
Nick Ascoli
BSides Charm
· 2023
Technical
OSINT
Threat Intel
Threat Modeling
Red
Talk
Open →
2023-06
26:36
Your AI Agent Just Got Pwned: A Security Engineer's Guide to Building Trustworthy Autonomous Systems
Matt Maisel
BSides Philly 2025
Technical
AI Security
Threat Modeling
Vulnerability Research
Intermediary
Red
Technical Deep-dives
Talk
Open →
2026-02
25:44
Threat Modeling for Security Professionals
Matt Trevors
BSides Peru
· 2019
Technical
Threat Modeling
Talk
Open →
2019-07
37:55
Purple Teaming 301 – Free Attack Simulation and Control Validation via Atomic Red Team
Jason Wright
BSides Charm
· 2024
Technical
Detection Engineering
Threat Modeling
Purple
Talk
Open →
2024-06
41:14
Airplane Mode: Cybersecurity @ 30,000+ Feet
Olivia Stella
BSides KC
· 2021
Technical
Supply Chain Security
Threat Modeling
Intro
Talk
Open →
2021-11
40:37
Human Vulnerability Management and Assessment in the Age of Zero Trust
June Jeremiah
BSides Vancouver
· 2021
Technical
Detection Engineering
Social Engineering
Threat Modeling
Demo
Talk
Open →
2021-06
45:00
Intelligence Driven Incident Response
Vito Alfano
Artem Artemov
BSides Zagreb
· 2024
Technical
DFIR
Threat Intel
Threat Modeling
Case Studies and Incidents Analysis
Talk
Open →
2025-03
24:24
Deciphering Threat Modeling: Balancing Tools And Manual Approaches For Effective Security
Niharika Gehani
BSides Toronto
· 2024
Technical
Threat Modeling
Methodology
Talk
Open →
2024-10
37:26
Identity At Risk: Identity-Centric Threat Modeling - Apostolos Giannakidis
Apostolos Giannakidis
BSides Dublin
· 2024
Technical
Active Directory
Cloud IAM
Threat Modeling
Talk
Open →
2024-06
31:44
Something's Phishy: See the Hook Before the Bait
Malachi Walker
BSidesSF
· 2025
Technical
Detection Engineering
Threat Intel
Threat Modeling
Blue
Technical Deep-dives
Talk
Open →
2025-06
51:22
The Security Practitioner's Guide to Going from "No" to "Whoa"
Josh Sokol
John Overbaugh
BSides Vancouver
· 2022
Career
Career & Soft Skills
GRC
Threat Modeling
Talk
Open →
2022-07
32:42
Navigating the Unknowns: Fraud Mitigation for Netflix Live Events
Aditi Gupta
Yue Wang
BSidesSF
· 2025
Technical
Detection Engineering
Threat Intel
Threat Modeling
Intermediary
Case Studies and Incidents Analysis
Talk
Open →
2025-10
View all 201 talks tagged Threat Modeling →