$700 Fullstack Live Event Free With a Membership!

Agile Threat Modeling: Fast, Safe, Secure

Security without sacrificing speed

Live 02. September 2025 | 13:00 - 16:00 CEST

Days
Hours
Minutes
Seconds

Stop threats before they arise

Security and agility are not mutually exclusive – on the contrary: those who identify threats early can develop faster, more securely, and more efficiently. In this live event, you will learn how to seamlessly integrate threat modeling into your agile workflows. Learn strategies for identifying, assessing, and mitigating risks early on—without slowing down the development flow. This event will give you practical insight into the most important methods for incorporating security from the outset.

From Zero Trust to STRIDE. Security reimagined

Take part in this exclusive Fullstack live event and learn how security can be integrated into agile development processes right from the start, how zero-trust approaches can be applied specifically to cloud-native architectures, and how proven methods such as STRIDE, data flow diagrams, and attack trees can help identify risks early on. Instead of mere theory, you will gain practical knowledge that you can apply directly in your team for faster, more secure, and more sustainable software development.

Program

13:00 - 14:00 | Threat Modeling for Agile Development | Shubham Thukral

The rapid pace of Agile development inadvertently exposes vulnerabilities when security considerations are not prioritized from the outset. This session dives into how to integrate robust threat modeling practices seamlessly into Agile workflows. Discover practical strategies to identify, prioritize, and mitigate security risks early in the development lifecycle without compromising agility. Real-world examples will provide actionable insights and foster a security-first mindset for Agile teams, ensuring that speed and safety go hand in hand.

This talk delves into the imperative of modernizing threat modeling practices grounded in Zero Trust principles, illuminating efforts to establish uniformity in assessing and mitigating cybersecurity risks, especially for cloud-native systems. This talk explores the diverse landscape of threat modeling methodologies, emphasizing the need for a standardized approach that aligns with Zero Trust principles to effectively identify, prioritize, and mitigate potential threats across varied organizational contexts. This talk delves into the diverse threat modeling methodologies, especially for modern cloud-native architectures. It emphasizes the need for a standardized approach incorporating a comprehensive end-to-end validation and verification flow. This flow should begin with a detailed system architecture analysis, including in-scope assets and components. Data flows within the system, design principles, and existing security controls (system strengths) should also be mapped. Next, the process should identify potential threats, attack scenarios, and the potential impact of each threat. Finally, mitigation strategies for these threats should be developed. By integrating validation and verification throughout these steps, organizations can ensure their threat models accurately reflect the cloud-native environment, proactively identify vulnerabilities early, and build a more secure system based on Zero Trust principles.

Security vulnerabilities often stem from design flaws introduced long before the first line of code is written. To counter this, threat modeling gives architects and developers a lightweight but effective way to uncover these issues early — long before they become vulnerabilities in production.

In this talk, I’ll introduce the foundational concepts of threat modeling and walk through established approaches and methods such as Data Flow Diagrams, STRIDE, Attack Trees, and the Cyber Kill Chain. The focus will be on understanding how to reason about threats systematically and how to apply these methods pragmatically in architectural and design discussions.

Join us and learn...

  • How to integrate threat modeling into agile processes in a streamlined and effective way.
  • How zero trust principles make cloud-native architectures more secure.
  • Which methods, such as STRIDE, data flow diagrams, and attack trees, deliver the greatest added value.
  • How to systematically identify threats and proactively mitigate them.

Expert Knowledge for

  • Agile developers who want to integrate security early into their workflows and minimize risks.
  • Software architects who want to analyze threats in a structured way and create robust, secure designs.
  • Cloud security specialists who want to apply zero-trust approaches to modern cloud-native systems.
  • IT security managers who want to bring practical threat modeling methods to their organization.

Get to know our experts

Shubham Thukral

Shubham Thukral

Expert in DevOps, cloud computing, CI/CD pipelines, containerization, and cybersecurity

Omer Farooq

Omer Farooq

Expert in application and cloud security architecture, DevSecOps automation, and threat modeling

Dimitrij Drus

Expert in distributed embedded systems & software architecture

Register Now and Join Our Fullstack Live Event

Fullstack Experience

Individual Membership
$ 10
00
Monthly
  • $100 off 3 conference tickets every year
  • Access all Live Events, Read content & Courses
  • 6 month access to conference recordings

Fullstack Elevate

Corporate Membership from 5 users
Inquire Now
  • Access all content on the platform
  • Up to 28% off conference tickets
  • Book your tickets directly on the platform
  • Training insights for team leads
  • easy training approval system

Already have Fullstack?

You’re all set! Grab a pen and paper and simply check back in at the time of the event to participate. Want to see more Fullstack Live Events? Browse through the complete list of events here.

Gen AI Engineering Days 2024

Live on 29 & 30. October 2024 | 13:00 – 16:30 CEST