When creating software exposed via a centralized or decentralized network, you need to be aware that it will be attacked. The reasons spectrum goes from—let’s see what will happen if I run this script, to getting critical data for various hostile purposes.
Join me for this web session and learn more about the archetypes of attackers who would benefit from attacking your infrastructure: What is their motivation? What approaches could they use? How can a geopolitical change shift their interest to your resources? How can you apply the Zero-Trust principles against them?
This session is for people who are developing software of any kind. It could be an API endpoint, a blog, or a complex application used by millions.
You are responsible for identifying those attackers so you can take measures to protect yourself and your consumers.
Let me help you!
What makes this session different?
I am interested in Threat Modeling. I helped two companies adopt a meta framework I developed. We live in a VUCA world. While you blink twice, the world has changed. I keep my observations up-to-date so that I can turn them into knowledge. I am ready to share them with you so you can use them in your own way of learning and adapting.
How to take part?
Please email me at bogomil@talkweb.eu and tell me your motivation for joining such training. I want to make it worthwhile for you.
- The session fee is 15 euros. You can pay me via the Lightning Network, a Bitcoin wallet, or traditional payment methods like a credit card.
- The dates for the trainings will be June 17, 2025 (EMEA tz) and June 18 (EST tz)
- This is not 1:1 session.