Engineering the Future of Software
Feb 3–4, 2019: Training
Feb 4–6, 2019: Tutorials & Conference
New York, NY
Please log in

(Continuous) threat modeling: What works?

Izar Tarandach (Autodesk)
4:50pm–5:40pm Tuesday, February 5, 2019
Security
Location: Grand Ballroom West
Secondary topics:  Best Practice, Case Study
Average rating: ****.
(4.00, 5 ratings)

Who is this presentation for?

  • Architects and developers

Level

Beginner

What you'll learn

  • Understand why threat modeling offers high, valuable returns, why threat modeling should be part of every developer's set of tools, and how to weave threat modeling into the day-to-day activities of your team

Description

For years security practitioners have been discussing how to do threat modeling the “right way.” There are many available methodologies, both formal and casual, along with many years of discussion into how to apply threat modeling to the world of Agile methodologies, continuous delivery, fast-moving frameworks, and languages and product integration. Most challenging is the question of how to still produce meaningful results without having a bottleneck in the much sought after security expert—in other words, how to enable teams to threat model their designs and products, taking into account that security may not be a strong part in the teams’ toolkit.

Autodesk has tried to solve these issues by going back to basics, focusing on what to look for as well as the security basics that every architect and developer should aware be aware of as a matter of fact: defending “the crown jewels” against flaws (not against specific threats); helping developers move into a culture of secure development by providing them with a guiding framework (not hours and hours of training); and dealing with issues at their root cause instead of specific best practices.

The company coupled this approach with an attempt to make the threat model a living document, using a “Threat Model Every Story” motto to help every developer make a habit of looking at security in their code, as it is written, in the same way they look at performance (i.e., security as a hallmark of quality code).

Izar Tarandach explains how this approach has worked, discusses both good and bad experiences, and shares lessons learned along the way.

Photo of Izar Tarandach

Izar Tarandach

Autodesk

Izar Tarandach is lead product security architect at Autodesk. Izar has spent more years than he’s willing to admit to in the information security arena. Previously, he was the security architect for Enterprise Hybrid Cloud at Dell EMC and a security consultant at the EMC Product Security Office. He’s a core contributor to the SAFECode training effort and a founding contributor to the IEEE Center for Security Design. He holds a master’s degree in computer science and security from Boston University and has served as an instructor in digital forensics at Boston University and in secure development at the University of Oregon.