SlideShare a Scribd company logo
Just Enough Threat Modeling
By
Stephen de Vries
@stephendv
About	me	
									
Founder	of	Con+nuum	Security	SL	
Open	Source	BDD-Security	project	
IriusRisk	SDLC	Risk	Management	solu+on	
17	years	in	AppSec	consul+ng		
Dev/Sec	skill	split
What	is	Threat	Modeling?	
A.k.a:		Architectural	Risk	Analysis
BSIMM	6
37%	Perform	design	review	of	high	risk	applica+ons	
28%	Have	SoQware	Security	Group	lead	design	review	efforts	
85%	Perform	security	feature	review	
Ra+o	of	SoQware	Security	to	Dev	+	QA	=	1	to	245
Participating Firms
The 78 participating organizations are drawn from four well-represented verticals (with some overlap): financial
services (33), independent software vendors (27), consumer electronics (13), and healthcare (10). Verticals with
lower representation in the BSIMM population include: insurance, telecommunications, security, retail, and energy.
Those companies among the 78 who graciously agreed to be identified include:
Adobe, Aetna, ANDA, Autodesk, Bank of America, Black Knight Financial Services, BMO Financial
Group, Box, Capital One, Cisco, Citigroup, Comerica, Cryptography Research, Depository Trust and
Clearing Corporation, Elavon, EMC, Epsilon, Experian, Fannie Mae, Fidelity, F-Secure, HP Fortify,
HSBC, Intel Security, JPMorgan Chase & Co., Lenovo, LinkedIn, Marks & Spencer, McKesson, NetApp,
NetSuite, Neustar, Nokia, NVIDIA , PayPal, Pearson Learning Technologies, Qualcomm, Rackspace,
Salesforce, Siemens, Sony Mobile, Symantec, The Advisory Board, The Home Depot, TomTom,
trainline, U.S. Bank, Vanguard, Visa, VMware, Wells Fargo, and Zephyr Health
On average, the 78 participating firms had practiced software security for 3.98 years at the time of assessment
(ranging from less than a year old to 15 years old as of October, 2015). All 78 firms agree that the success of their
of software security it has not previously been
applied at this scale. Previous work has either
described the experience of a single organization
or offered prescriptive guidance based only on a
combination of personal experience and opinion.
simply reported.
Security	cannot	slow	down	development
Ar+sanal	HandcraQed	Threat	Models	since	1999
Accuracy
25%
50%
75%
100%
Resources required (Time + Skill)
Threat	Modelling	Process
Accuracy
25%
50%
75%
100%
Resources required (Time + Skill)
Threat	Modelling	Process
The hard stuff
The easy stuff
Accuracy
25%
50%
75%
100%
Resources required (Time + Skill)
Threat	Modelling	Process
The hard stuff
The easy stuff
Workshop/Analysis	based	Threat	Modelling Threat	Modelling	with	Templates	/	Pa[erns
Op+mising	with	templates	/	checklists
Use	a	3rd	party	auth	provider
Countermeasure	2
Only	if	Countermeasure	2	
is	not	an	op+on
Use	Company	X	SSO	for	all	
Internet	facing	applica+ons
OWASP	ASVS	as	a	Threat	Model	Template
V2.13	Verify	that	account	passwords	are	
protected	using	an	adap+ve	key	deriva+on	
func+on,	salted	using	a	salt	that	is	unique	to	
that	account…
Countermeasure	1
If	the	DB	is	compromised	then	
a[ackers	could	also	compromise	
users’	authen+ca+on	creden+als
Threat
Web	Applica+on	Threat	Model	Template
Problems	with	a	one	size	fits	all	approach
Threat	Model	
Template
100%	Accurate	
Threat	Model	
of	System
Problems	with	a	one	size	fits	all	approach
100%	Accurate	
Threat	Model	
of	System
Threat	Model		
Template
Deconstruct	the	template	into	components
TM	
Template	for	DB
TM	
Template	for	
Web	Service
TM	
Template	for	
WebUI
•HTML	Web	UI	Threat	Template.xlsx	
•Mobile	Device	Threat	Template.xlsx	
•NoSQL	Database	Threat	Template.xlsx	
•SQL	Database	Threat	Template.xlsx	
•HTTP	Service	Threat	Template.xlsx	
•REST	Web	Service	Threat	Template.xlsx	
•SOAP	Web	Service	Threat	Template.xlsx	
•Amazon	EC2	Threat	Template.xlsx	
•Connec+on	to	Third	Party	API	Threat	Template.xlsx
•HTML	Web	UI	Threat	Template.xlsx	
•Mobile	Device	Threat	Template.xlsx	
•NoSQL	Database	Threat	Template.xlsx	
•SQL	Database	Threat	Template.xlsx	
•HTTP	Service	Threat	Template.xlsx	
•Authen+ca+on	
•Creden+als	Reset	
•User	Registra+on	
•Profile	Update	
•Inter	account	funds	transfer	
•Na+onal	funds	transfer		
•Interna+onal	funds	transfer	
•…	
•REST	Web	Service	Threat	Template.xlsx	
•SOAP	Web	Service	Threat	Template.xlsx
• HTML	Web	UI	Threat	Template.xlsx	
• Authen+ca+on	
• Mobile	Device	Threat	Template.xlsx	
• Authen+ca+on	
• Creden+als	Reset	
• Profile	Update	
• NoSQL	Database	Threat	Template.xlsx	
• SQL	Database	Threat	Template.xlsx	
• HTTP	Service	Threat	Template.xlsx	
• Authen+ca+on	
• Creden+als	Reset	
• User	Registra+on	
• Profile	Update	
• Inter	account	funds	transfer	
• Na+onal	funds	transfer		
• Interna+onal	funds	transfer	
• …	
• REST	Web	Service	Threat	Template.xlsx	
• Authen+ca+on	
• Profile	Update	
• Funds	Transfer	
• SOAP	Web	Service	Threat	Template.xlsx
Introducing Risk Patterns
Re-usable patterns of threats + countermeasures
that apply to a slice of architecture
Web	UI Web	ServiceAuthen+cate
Worked	Example:	Web	Authen+ca+on
Threat A: Dictionary attack against username using common password
Threat B: Login bypassed by replaying credentials stored in Browser
Threat C: Credentials posted to a spoofed server
Web	UI Web	ServiceAuthen+cate
Threat D: Legitimate users cannot access the site because of DoS
Use	Case:					AuthenIcate
Threat A: Dictionary attack against username using common password
Countermeasure	1:	Implement	password	quality	checks
Countermeasure	2:	Rate	limit	authen+ca+on	a[empts	from	same	IP
Threat B: Login bypassed by replaying credentials stored in Browser
Countermeasure	4:	Set	AUTOCOMPLETE	to	false	on	login	form
Countermeasure	5:	Enable	TLS	on	the	server
Countermeasure	6:	Set	the	HSTS	Header
Threat C: Credentials posted to a spoofed server
Countermeasure	3:	Require	the	use	of	2FA
Threat D: Legitimate users cannot access service because of DoS
Countermeasure	7:	Enable	upstream	DoS	protec+on
•Are	the	threat+countermeasures	inherent	in	this	type	of	
component	?	
•Are	the	threat+countermeasures	inherent	in	the	use-case?	
•Are	the	threat+countermeasures	specific	to	this	use-case	in	this	
component?
Web	UI Web	ServiceAuthen+cate
Iden+fy	Pa[erns
Threat A: Dictionary attack against username using common password
Countermeasure	1:	Implement	password	quality	checks
Countermeasure	2:	Rate	limit	authen+ca+on	a[empts	from	same	IP
Threat B: Login bypassed by replaying credentials stored in Browser
Countermeasure	4:	Set	AUTOCOMPLETE	to	false	on	login	form
Countermeasure	5:	Enable	TLS	on	the	server
Countermeasure	6:	Set	the	HSTS	Header
Threat C: Credentials posted to a spoofed server
Countermeasure	3:	Require	the	use	of	2FA
Threat D: Legitimate users cannot access service because of DoS
Countermeasure	7:	Enable	upstream	DoS	protec+on
Web	Service+	
Authen+ca+on
WebUI+Authen+ca+on
Web	
Service+Authen+ca+on
Web	Service
Does	the	pa[ern	apply	in	a	more	generic	form?	
Can	a	varia+on	of	the	pa[ern	be	applied	to	a	similar	
component	or	use-case?
Op+mise	for	re-use
Threat A: Dictionary attack against username using common password
Countermeasure	1:	Implement	password	quality	checks
Countermeasure	2:	Rate	limit	authen+ca+on	a[empts	from	same	IP
Countermeasure	3:	Require	the	use	of	2FA
Risk Pattern:
User/Pass Authentication against any Service
Web	Service	+	
Authen+ca+on
Risk Pattern:
Authentication from WebUI
Threat B: Login bypassed by replaying credentials stored in Browser
Countermeasure	4:	Set	AUTOCOMPLETE	to	false	on	login	form
WebUI+Authen+ca+on
Risk Pattern:
Authentication from Mobile Client
Threat B: Login bypassed by replaying credentials stored on device
Countermeasure	4:	Do	not	store	creden+als	on	the	device
Countermeasure	5:	Encrypt	the	creden+als	stored	on	the	device	using	the	passcode
Risk Pattern:
Authentication from WebUI
Threat B: Login bypassed by replaying credentials stored in Browser
Countermeasure	4:	Set	AUTOCOMPLETE	to	false	on	login	form
Can	a	varia+on	of	the	pa[ern	be	applied	to	a	similar	component	or	use-case?
Countermeasure	5:	Enable	TLS	on	the	server
Countermeasure	6:	Set	the	HSTS	Header
Threat C: Credentials posted to a spoofed server
Risk Pattern:
Authentication against an HTTP Service
Web	
Service+Authen+ca+on
Risk Pattern:
Generic-Service
Threat D: Legitimate users cannot access service because of DoS
Countermeasure	7:	Enable	up-stream	DoS	protec+onWeb	Service
Risk Pattern:
User/Pass Authentication against a Service
Risk Pattern:
Authentication against an HTTP Service
Risk Pattern:
Authentication from WebUI
Risk Pattern:
Authentication from Mobile Device
Client ServerAuthen+cate
Generated Threats & Countermeasures
Risk Pattern:
Generic-Service
Web	UI Web	Service
U/P	Authen+cate
Generated Threats & Countermeasures
Threat A: Dictionary attack against username using common password
Implement	password	quality	checks
Rate	limit	connec+ons	from	the	same	IP	address
Require	the	use	of	2FA
Threat B: Credentials posted to a spoofed server
Set	the	HSTS	header
Enable	TLS	on	the	server
Risk Pattern:
User/Pass Authentication against a Service
Risk Pattern:
Authentication against an HTTP Service
Risk Pattern:
Authentication from WebUI
Risk Pattern:
Authentication from Mobile Device
Risk Pattern:
Generic-Service
Threat D: Legitimate users cannot access service because of DoS
Enable	up-stream	DoS	preven+on
Web	UI Web	Service
Authen+cate
Generated Threats & Countermeasures
Threat B: Login bypassed by replaying credentials stored in Browser
Set	AUTOCOMPLETE	to	false	on	login	form
Risk Pattern:
User/Pass Authentication against a Service
Risk Pattern:
Authentication against an HTTP Service
Risk Pattern:
Authentication from WebUI
Risk Pattern:
Authentication from Mobile Device
Risk Pattern:
Generic-Service
Web	UI	on	
Mobile
Web	ServiceAuthen+cate
Generated Threats & Countermeasures
Threat B: Login bypassed by replaying credentials stored on device
Do	not	store	creden+als	on	the	device
Encrypt	the	creden+als	stored	on	the	device	using	the	passcode
Risk Pattern:
User/Pass Authentication against a Service
Risk Pattern:
Authentication against an HTTP Service
Risk Pattern:
Authentication from WebUI
Risk Pattern:
Authentication from Mobile Device
Risk Pattern:
Generic-Service
Web	UI REST	API
Token	Auth
Generated Threats & Countermeasures
Threat B: Credentials posted to a spoofed server
Set	the	HSTS	header
Enable	TLS	on	the	server
Risk Pattern:
User/Pass Authentication against a Service
Risk Pattern:
Authentication against an HTTP Service
Risk Pattern:
Authentication from WebUI
Risk Pattern:
Authentication from Mobile Device
Risk Pattern:
Generic-Service
Threat D: Legitimate users cannot access service because of DoS
Enable	up-stream	DoS	preven+on
Web	UI SSH	Service
U/P	Authen+cate
Generated Threats & Countermeasures
Threat A: Dictionary attack against username using common password
Implement	password	quality	checks
Rate	limit	connec+ons	from	the	same	IP	address
Require	the	use	of	2FA
Risk Pattern:
User/Pass Authentication against a Service
Risk Pattern:
Authentication against an HTTP Service
Risk Pattern:
Authentication from WebUI
Risk Pattern:
Authentication from Mobile Device
Risk Pattern:
Generic-Service
Threat D: Legitimate users cannot access service because of DoS
Enable	up-stream	DoS	preven+on
OS NTP	Service
Get	Time
Generated Threats & Countermeasures
Risk Pattern:
User/Pass Authentication against a Service
Risk Pattern:
Authentication against an HTTP Service
Risk Pattern:
Authentication from WebUI
Risk Pattern:
Authentication from Mobile Device
Risk Pattern:
Generic-Service
Threat D: Legitimate users cannot access service because of DoS
Enable	up-stream	DoS	preven+on
Generic-Service
HTTP-Service
JSON-Service
Server-side	Session
Data-store
SQL	DB
NoSQL	DB
Generic-Client
Thick	Client
HTML/JS	Client
Mobile	Client
SOAP-Service
Sensi+ve	
Data-Transport
Hierarchical	Risk	Pa[ern	Library
AuthN
AuthN-SF AuthN-2FA
UserPass Token
Client-side	Session
Just Enough Threat Modeling
What	type	of	component	are	
	you	building?
Web	Service	
Mobile	client	
Web	UI
How	are	users	authen+cated?
Username	&	Password	
2FA	
No	auth
Rules	Engine
Generic-Service
HTTP-Service
Stateful-Session
SF-Auth
SF-Auth-HTTP-Service
Sensi+ve-DataTransport
Risk Patterns
rule	“SF-AUTH	for	HTTP-Service“	
when	
				RiskPa[ern(ref	==	“HTTP-SERVICE")	
				RiskPa[ern(ref	==	“SF-Auth“)	
then	
				insertLogical(new	RiskPa[ern(“SF-Auth-HTTP-Service“));	
				insertLogical(new	RiskPa[ern(“Stateful-Session“));	
				insertLogical(new	RiskPa[ern(“Sensi+ve-DataTransport“));	
end
rule	“User	chooses	Web	Service“	
when	
				Ques+on(id	==	“web.service”,	answer	==	true)	
then	
				insertLogical(new	RiskPa[ern("HTTP-SERVICE"));	
end
rule	“User	chooses	User/Pass	auth“	
when	
				Ques+on(id	==	“auth.user.pass”,	answer	==	true)	
then	
				insertLogical(new	RiskPa[ern(“SF-Auth"));	
end
Advantages
Speed	and	scale	threat	modelling	
Create	a	persistent	Threat/Countermeasure	knowledge-base	
Improved	consistency
Disadvantages
Checklists	short-circuit	thinking	about	the	problem	
Garbage	In	Garbage	Out
Community Edition
https://github.com/continuumsecurity/IriusRisk
Derive a threat model from an architecture questionnaire
Manage risk by applying countermeaures…
Or accepting the risk
Push countermeasures directly to Jira
Auto-sync countermeasure state with Jira
Publishing threat models as Templates for use by other users
Accuracy
25%
50%
75%
100%
Resources required (Time + Skill)
Tool	vendors	for	Threat	Modeling
http://mozilla.github.io/seasponge
Visio + Excel
https://github.com/continuumsecurity/IriusRisk
www.continuumsecurity.net
Questions?
@stephendv

More Related Content

PPTX
Automating security tests for Continuous Integration
PDF
Vulnerabilities are bugs, Let's Test For Them!
PPTX
Continuous and Visible Security Testing with BDD-Security
PDF
T23 HTML5 Security Testing at Spotify
PDF
SecDevOps - The Operationalisation of Security
PPTX
Integrating security into Continuous Delivery
PPTX
Continuous Security Testing in a Devops World #OWASPHelsinki
PPTX
Continuous Security Testing with Devops - OWASP EU 2014
Automating security tests for Continuous Integration
Vulnerabilities are bugs, Let's Test For Them!
Continuous and Visible Security Testing with BDD-Security
T23 HTML5 Security Testing at Spotify
SecDevOps - The Operationalisation of Security
Integrating security into Continuous Delivery
Continuous Security Testing in a Devops World #OWASPHelsinki
Continuous Security Testing with Devops - OWASP EU 2014

What's hot (19)

PDF
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
PPTX
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
PDF
SecDevOps
PPTX
Simplify Dev with Complicated Security Tools
PDF
Devops security-An Insight into Secure-SDLC
PPTX
we45 SecDevOps Presentation - ISACA Chennai
PPTX
Implementing an Application Security Pipeline in Jenkins
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PDF
A Successful SAST Tool Implementation
PDF
we45 - SecDevOps Concept Presentation
PPTX
SecDevOps 2.0 - Managing Your Robot Army
PDF
Automated Security Testing
PDF
DevSecOps: Minimizing Risk, Improving Security
PDF
Better Security Testing: Using the Cloud and Continuous Delivery
PDF
DevSecOps | DevOps Sec
PPTX
Unit testing : what are you missing for security
PDF
we45 - Infrastructure Penetration Testing with LeanBeast Case Study
PPTX
DevSecOps : an Introduction
PDF
Dev seccon london 2016 intelliment security
Security DevOps - Staying secure in agile projects // OWASP AppSecEU 2015 - A...
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
SecDevOps
Simplify Dev with Complicated Security Tools
Devops security-An Insight into Secure-SDLC
we45 SecDevOps Presentation - ISACA Chennai
Implementing an Application Security Pipeline in Jenkins
DevSecCon London 2017: when good containers go bad by Tim Mackey
A Successful SAST Tool Implementation
we45 - SecDevOps Concept Presentation
SecDevOps 2.0 - Managing Your Robot Army
Automated Security Testing
DevSecOps: Minimizing Risk, Improving Security
Better Security Testing: Using the Cloud and Continuous Delivery
DevSecOps | DevOps Sec
Unit testing : what are you missing for security
we45 - Infrastructure Penetration Testing with LeanBeast Case Study
DevSecOps : an Introduction
Dev seccon london 2016 intelliment security
Ad

Viewers also liked (17)

PDF
MongoDB NoSQL database a deep dive -MyWhitePaper
PDF
Webinar - Bringing Game Changing Insights with Graph Databases
PDF
Threat modeling with architectural risk patterns
PDF
2017 iosco research report on financial technologies (fintech)
PPTX
Threat Modeling And Analysis
PPTX
Tugas4 1412510602 dewi_apriliani
PPTX
Comparing 30 MongoDB operations with Oracle SQL statements
PDF
Tracxn Research - Healthcare Analytics Landscape, February 2017
PDF
Scalable threat modelling with risk patterns
PDF
Tracxn Research - Mobile Advertising Landscape, February 2017
PPTX
GCP - Continuous Integration and Delivery into Kubernetes with GitHub, Travis...
PPTX
Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...
PPTX
Webinar: Fighting Fraud with Graph Databases
PDF
2015 Internet Trends Report
PPTX
Tugas 4 0317-fahreza yozi-1612510832 -
PDF
Security as Code: DOES15
MongoDB NoSQL database a deep dive -MyWhitePaper
Webinar - Bringing Game Changing Insights with Graph Databases
Threat modeling with architectural risk patterns
2017 iosco research report on financial technologies (fintech)
Threat Modeling And Analysis
Tugas4 1412510602 dewi_apriliani
Comparing 30 MongoDB operations with Oracle SQL statements
Tracxn Research - Healthcare Analytics Landscape, February 2017
Scalable threat modelling with risk patterns
Tracxn Research - Mobile Advertising Landscape, February 2017
GCP - Continuous Integration and Delivery into Kubernetes with GitHub, Travis...
Introducing NoSQL and MongoDB to complement Relational Databases (AMIS SIG 14...
Webinar: Fighting Fraud with Graph Databases
2015 Internet Trends Report
Tugas 4 0317-fahreza yozi-1612510832 -
Security as Code: DOES15
Ad

Similar to Just Enough Threat Modeling (20)

PDF
Integrated Security for Software Development and Advanced Penetration Testing...
PDF
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PDF
Continuous security
PDF
Saas security stock company
PDF
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
PDF
Top 9 Data Security Trends for 2012
PDF
Crowdsourced Vulnerability Testing
PDF
[OPD 2019] Threat modeling at scale
PDF
ScotSecure Cyber Security Summit 2025 Edinburgh
PDF
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
PDF
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
PPTX
Top Application Security Trends of 2012
PDF
Safeguarding Your Mission Understanding Common Security Threats and How to P...
PDF
Securing the Future of Applications Meetup 18092024
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
PDF
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
PPTX
Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
PDF
Top 6 Web Application Security Best Practices.pdf
Integrated Security for Software Development and Advanced Penetration Testing...
Social Enterprise Rises! …and so are the Risks - DefCamp 2012
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Continuous security
Saas security stock company
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Top 9 Data Security Trends for 2012
Crowdsourced Vulnerability Testing
[OPD 2019] Threat modeling at scale
ScotSecure Cyber Security Summit 2025 Edinburgh
Insider's Guide to the AppExchange Security Review (Dreamforce 2015)
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
Top Application Security Trends of 2012
Safeguarding Your Mission Understanding Common Security Threats and How to P...
Securing the Future of Applications Meetup 18092024
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
Introduction Sebyde BV | Security Testing | Security Awareness | Secure Devel...
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Top 6 Web Application Security Best Practices.pdf

Recently uploaded (20)

PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Patient Appointment Booking in Odoo with online payment
PPTX
history of c programming in notes for students .pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
Website Design Services for Small Businesses.pdf
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Complete Guide to Website Development in Malaysia for SMEs
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
assetexplorer- product-overview - presentation
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Operating system designcfffgfgggggggvggggggggg
Weekly report ppt - harsh dattuprasad patel.pptx
Navsoft: AI-Powered Business Solutions & Custom Software Development
Design an Analysis of Algorithms I-SECS-1021-03
Patient Appointment Booking in Odoo with online payment
history of c programming in notes for students .pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Website Design Services for Small Businesses.pdf
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Odoo Companies in India – Driving Business Transformation.pdf
Complete Guide to Website Development in Malaysia for SMEs
CHAPTER 2 - PM Management and IT Context
Why Generative AI is the Future of Content, Code & Creativity?
Wondershare Filmora 15 Crack With Activation Key [2025
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Reimagine Home Health with the Power of Agentic AI​
assetexplorer- product-overview - presentation

Just Enough Threat Modeling