Skip to content

Explore Threat Modeling Methodologies

Photo of Steve G
Hosted By
Steve G. and 3 others
Explore Threat Modeling Methodologies

Details

Join us on Wednesday 18th June for a deep dive into Threat Modeling methodologies. Whether you’re just getting started with threat modelling or looking to elevate your current practice, this session will equip you with practical strategies to embed security throughout the software development lifecycle - without slowing innovation.

Explore Threat Modeling Methodologies: Practical Strategies for Scaling Secure Design

Details
Date: Wednesday, 18th June
Time: 6:00–8:00 PM
Location: 22 Bishopsgate, Level 55, EC2N 4BQ - Due to building security requirements, all attendees must RSVP providing first name, last name and company email address to gain access.

IMPORTANT - if you previously RSVP'd without providing these details, please complete this form. RSVPs are now CLOSED

Synopsis
Join us for an engaging evening focused on demystifying threat modeling and equipping your teams with practical strategies to embed security throughout the software development lifecycle. This session will explore a range of methodologies—including STRIDE, DREAD, PASTA, and VAST—highlighting the real-world benefits and limitations of each.
Whether you're new to threat modeling or looking to evolve your current practices, you'll gain insights into how different frameworks align with business goals, technical architecture, and adversarial risk—while supporting agility and innovation.
Through real-world examples and implementation tips, attendees will learn how to:

  • Evaluate which methodologies best fit your team’s maturity, objectives, and workflows.
  • Identify effective starting points based on business risk and compliance requirements.
  • Engage key technical stakeholders and integrate seamlessly with Agile and CI/CD pipelines.
  • Leverage automation and AI to enhance modeling accuracy and scale threat identification.

You’ll walk away with a practical understanding of how to build or enhance a cross-functional, continuous threat modeling practice—regardless of the methodology you choose.

Join the community:
Can't make it to the event? Keep up to date with our activities on LinkedIn & Twitter

With thanks to our Sponsors - ThreatModeler, Orca Security and our venue hosts Palo Alto Networks.

Photo of DevSecOps - London Gathering group
DevSecOps - London Gathering
See more events
Palo Alto Networks Office
22 Bishopsgate, Level 55 · London