Explore all our resources

Unlock the power of threat modeling for your business with expert-guided learning designed to grow your skills.

A collection of the best threat modeling blogs, guides and the ultimate threat models, all created by our awesome community.

Threat Model Collections

Need some inspiration for your first or 1000th threat model? Browse a variety of threat models crafted by our community, created on a napkin, a whiteboard, a spreadsheet, a word document, or some advanced threat modeling tools.

Featured Threat Model 04

A threat model for AI-assisted software featuring extensive frameworks and threat libraries, including STRIDE, LINDDUN, Plot4.ai, OWASP, and others.
Read more

Featured Threat Model 03

A threat model of a rideshare app, created by the 2024 Hackathon Finalist team using a combination of STRIDE and LINDDUN GO as the primary methodologies.
Read more

Featured Threat Model 02

A threat model of a rideshare app created by the finalist team of the 2023 Threat Modeling Hackathon using ATASM, c4 methodology, and graphviz.
Read more

Featured Threat Model 01

The scope of the threat model is a microservice application (RideShare) and associated directly interacting entities such as data stores and middleware.
Read more

Just built a threat model you’re proud of?

Don’t keep it to yourself. Did you know you can showcase your threat models in the Threat Modelling Connect community? Help accelerate innovation— together we can create a safer community for all.

Guides

Stay one step ahead by becoming a threat modeling champion through guided learning withtips and insights from leading experts. Everything you need to master threat modeling,all in one place.

A Step-by-step Guide to Create Your First Threat Model (Template Included)

A steb-by-step guide to creating a structured and repeatable threat model to identify threats and mitigate them against valuable assets in a system.
View post

Embedding Threat Modeling in the DevOps Lifecycle (Part 2: Risk Management)

Part 2 of this series will look at the often problematic relationship between risk management and threat modelling practices in organisations.
View post

Embedding Threat Modelling in the DevOps Lifecycle (Part 1: Backlog Management)

The challenges some backlog management practices by engineering teams and how they can help or have a negative impact on your threat models.
View post

A Guide to Embedding Threat Modeling in Risk Management (Part 1)

An overview of a general risk management process and a strategic perspective on some of the considerations about embedding threat modeling into it.
View post

Got a guide that can help threat modeling for everyone?

Did you know you can showcase your shiny new template, framework, or technique in the Threat Modelling Connect community? Help accelerate innovation— together we can create a safer community for all.

Blogs

Stay one step ahead by becoming a threat modeling champion through guided learning withtips and insights from leading experts. Everything you need to master threat modeling,all in one place.

Models & Frameworks

Threat Modeling for Simplicity

Threat modeling should be simpler. Discover how the "science of simplicity" can be applied to threat modeling, making it more accessible and effective for wider adoption across the SDLC.
View post
ThreatModCon

Recap: ThreatModCon 2024 Lisbon

Catch up on the highlights from ThreatModCon 2024 Lisbon and explore the key moments and insights that shaped the event, all about threat modeling... Of course.
View post
ThreatModCon

Insights from ThreatModCon 2024 Lisbon

A look back at ThreatModCon 20024 Lisbon and some of the main threat modeling talks & events that took place; including AI security and enterprise architecture
View post
Hackathon

Threat Modeling Hackathon Winner 2024

Explore the winning threat model for AI-assisted software from our Spring 2024 Threat Modeling Hackathon. Inspired by libraries like STRIDE, LINDDUNGO, Plot4.ai, OWASP LLM, OWASP API Security, and OWASP CI/CD Security, this multi-perspective approach is a must-see.
View post

On-Demand

Missed a workshop or webinar or you just can’t wait till out next Threat Modeling Connect event?We've got you, with our on-demand service you can relive some of our past events and much moreready to be binged on-demand!

Meetup

Meta Threat Modeling

This session, led by Hendrik Ewerlin, will delve into using threat modeling techniques to analyze, assess, and refine your threat modeling processes.
Watch now
Workshop

Security threat modeling: STRIDE In action

In this workshop, you’ll learn by doing threat modeling through real-world, hands-on exercises, reviewing data flow diagrams, identifying threats & mitigations
Watch now
Workshop

Privacy threat modeling: LINDDUN In action

In this workshop, you’ll delve into the essence of privacy, expose real-world privacy threats, and be equipped with the skills to defend against them.
Watch now
Workshop

Create your first threat model using a spreadsheet

In this workshop, you’ll learn the basics of threat modeling and apply the knowledge to create a threat model following six steps right in a spreadsheet.
Watch now