mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.1K
active users

#ThreatModeling

5 posts5 participants0 posts today
Tanya Janca | SheHacksPurple :verified: :verified:<p>With 25+ presentations to choose from, I cover everything from <a href="https://infosec.exchange/tags/securecoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securecoding</span></a> and <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a> to AI risks and <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a>—always with humor, clarity, and actionable takeaways.</p><p>💡 These aren’t just talks—they’re lessons your team will remember.</p><p><a href="https://twp.ai/9PUvTW" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/9PUvTW</span><span class="invisible"></span></a></p><p>2/3</p>
Marco Ciappelli🎙️✨:verified: :donor:<p>🎯 FINAL Pre-Event Interview Alert! Next Stop: Las Vegas!</p><p>This is it—our last <a href="https://infosec.exchange/tags/BlackHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHat</span></a> USA 2025 conversation before we hit the road to Vegas (and who knows, maybe we'll broadcast from a desert pit stop along the way! 🚗)</p><p>But what a way to close out our pre-event coverage...</p><p>When Constitutional Law Meets <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a>: A Critical Conversation We All Need to Hear</p><p>What happens when we stop seeing government surveillance as a necessary evil and start recognizing it as a primary threat to privacy?</p><p>Jennifer Granick, ACLU's Surveillance and Cybersecurity Counsel, challenges us to rethink everything we assume about digital <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> in her upcoming <a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> 2025 keynote.</p><p>In this preview conversation with Marco Ciappelli, Jennifer makes a compelling case:</p><p>✅ The Fourth Amendment hasn't kept pace with technology <br>✅ Legal reform is too slow—so technologists must lead <br>✅ Privacy isn't just a legal problem—it's a design challenge <br>✅ We need a new <a href="https://infosec.exchange/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a> that puts unchecked surveillance at the center</p><p>From defending hackers since <a href="https://infosec.exchange/tags/DEFCON" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON</span></a> 3 to fighting surveillance overreach at the ACLU, Jennifer brings decades of frontline experience to this critical discussion.</p><p>The key takeaway? While lawmakers debate, engineers and designers hold the power to protect civil liberties through encryption, data minimization, and privacy-first architecture.</p><p>This isn't just another privacy talk—it's a call to action for every technologist, policymaker, and privacy advocate.</p><p>🎥 Watch: <a href="https://youtu.be/dPCvsBqu6Uc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/dPCvsBqu6Uc</span><span class="invisible"></span></a></p><p>🎧 Listen: <a href="https://itspmagazine.simplecast.com/episodes/from-hacker-defense-to-civil-liberties-threat-modeling-meets-constitutional-law-a-black-hat-usa-2025-keynote-conversation-with-jennifer-granick-on-location-coverage-with-sean-martin-and-marco-ciappelli" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">itspmagazine.simplecast.com/ep</span><span class="invisible">isodes/from-hacker-defense-to-civil-liberties-threat-modeling-meets-constitutional-law-a-black-hat-usa-2025-keynote-conversation-with-jennifer-granick-on-location-coverage-with-sean-martin-and-marco-ciappelli</span></a></p><p>📍 Follow our complete Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">itspmagazine.com/bhusa25</span><span class="invisible"></span></a></p><p>See you in Vegas! 🎰 Feeling lucky, Sean Martin, CISSP?</p><p><a href="https://infosec.exchange/tags/BlackHatUSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackHatUSA</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CivilLiberties" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CivilLiberties</span></a> <a href="https://infosec.exchange/tags/Surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Surveillance</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/BHUSA25" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BHUSA25</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/ACLU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACLU</span></a> <a href="https://infosec.exchange/tags/PrivacyByDesign" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivacyByDesign</span></a></p>
Jay Thoden van Velzen ☁️​🛡️​:lolsob:<p>The 'R' in STRIDE threat modeling was always a bit undervalued. Important, yes, but as long as you logged all the things and had a transaction record you' were good.</p><p>But in agentic AI, (non-)repudiation becomes far more important. Not only to trace what agents do, but also to ensure that agents act according to the wishes, expectations and instructions of their human operators, and that buyers and sellers agree on what happened.</p><p>From being important, but not particularly complex, Repudiation is now a full first class citizen among Spoofing, Tampering, Information Disclosure, Denial of Service and Elevation of Privileges</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a> <a href="https://infosec.exchange/tags/agenticai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>agenticai</span></a></p>
DCNTTM<p>Registration is open for DC's Next Top Threat Model at <span class="h-card" translate="no"><a href="https://defcon.social/@defcon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>defcon</span></a></span> 33. Visit <a href="https://threatmodel.us" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">threatmodel.us</span><span class="invisible"></span></a> to learn more about our contest and register. </p><p><a href="https://defcon.social/tags/DEFCON" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON</span></a> <a href="https://defcon.social/tags/DEFCON33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON33</span></a> <a href="https://defcon.social/tags/DC33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DC33</span></a> <a href="https://defcon.social/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/ProdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProdSec</span></a> <a href="https://defcon.social/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a></p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>I interviewed Kim Wuyts for a <a href="https://infosec.exchange/tags/Semgrep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Semgrep</span></a> fireside chat called Privacy by Design: Making Threat Modeling Work for Data Protection, and it was super fun!</p><p>Watch us here: <a href="https://twp.ai/4ipiK6" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4ipiK6</span><span class="invisible"></span></a></p><p>@KimWuyts <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a></p>
OWASP Foundation<p>Level up your skills with one of our 2-Day Training Sessions at OWASP Global AppSec USA 2025!</p><p>🚨 REGISTER: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p>Choose from two powerhouse training sessions, Nov 4–5 in Washington, D.C.:</p><p>Whiteboard Hacking with Robert Hurlbut: Hands-on threat modeling led by industry pros</p><p>Attacking AI with Jason Haddix: Explore the offensive side of AI security</p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a></p>
OWASP Foundation<p>OWASP Global AppSec USA 2025 is coming to Washington, D.C. Nov 3–7!</p><p>Join 800+ security pros for hands-on trainings, top-tier keynotes, CTFs, and real-world insights across 6 dynamic tracks.</p><p>Connect, learn, and level up in the heart of AppSec innovation.</p><p>Training: Nov 3–5 | Conference: Nov 6–7</p><p>📍 Register now: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a></p>
OWASP Foundation<p>We’re thrilled to welcome two of the industry’s most respected voices to the keynote lineup this November in Washington, D.C.:</p><p>📍 Daniel Miessler – AI &amp; Security Researcher, Entrepreneur, and Founder of Unsupervised Learning.</p><p>📍 Adam Shostack – Renowned threat modeling expert, consultant, and author at Shostack &amp; Associates.</p><p>🎟️ Register now: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a></p>
DCNTTM<p>DC's Next Top Threat Model is back for <span class="h-card" translate="no"><a href="https://defcon.social/@defcon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>defcon</span></a></span> 33!! Visit <a href="https://threatmodel.us" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">threatmodel.us</span><span class="invisible"></span></a> for more details.</p><p><a href="https://defcon.social/tags/DEFCON" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON</span></a> <a href="https://defcon.social/tags/DEFCON33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON33</span></a> <a href="https://defcon.social/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://defcon.social/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a> <a href="https://defcon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
OWASP Foundation<p>🚨 Only have one day to train? Make it count.</p><p>Join us on at OWASP Global AppSec USA 2025 in Washington, D.C. for a full day of expert-led, hands-on security training.</p><p>🎯 Whether you're a builder, breaker, defender, or manager, there's a course to help you go deeper.</p><p>🔗 Register: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfosecTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfosecTraining</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/OWASP2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP2025</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a> <a href="https://infosec.exchange/tags/SecurityTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityTraining</span></a> <a href="https://infosec.exchange/tags/PrivacySecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PrivacySecurity</span></a></p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>With 25+ presentations to choose from, I cover everything from <a href="https://infosec.exchange/tags/securecoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securecoding</span></a> and <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a> to AI risks and <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a>—always with humor, clarity, and actionable takeaways.</p><p>💡 These aren’t just talks—they’re lessons your team will remember.</p><p><a href="https://twp.ai/9PTSLx" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/9PTSLx</span><span class="invisible"></span></a></p><p>2/3</p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>I interviewed Kim Wuyts for a <a href="https://infosec.exchange/tags/Semgrep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Semgrep</span></a> fireside chat called Privacy by Design: Making Threat Modeling Work for Data Protection, and it was super fun!</p><p>Watch us here: <a href="https://twp.ai/4inxqU" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4inxqU</span><span class="invisible"></span></a></p><p>@KimWuyts <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a></p>
OWASP Foundation<p>Join renowned expert Adam Shostack for a 3-day Threat Modeling Intensive, Nov 3–5, at OWASP Global AppSec USA 2025.</p><p>You’ll sharpen core threat modeling skills, then dive into how AI can support (and sometimes confuse) the process. Learn to evaluate what AI tools get right—and wrong—and how to integrate them responsibly into your security workflows.</p><p>👉 REGISTER: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/OWASPAppSecUSA2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASPAppSecUSA2025</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a></p>
LLMsOpen Source Tool for AI-Specific Threat Modeling — Fast, Context-Aware, and Developer-Friendly Open Source Tool for AI-Specific Threat Modeling — Fast, Context-Aware, and Developer-Frie...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/ai-threat-modeling" target="_blank">#ai-threat-modeling</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/infosec" target="_blank">#infosec</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/open-source" target="_blank">#open-source</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/threat-modeling" target="_blank">#threat-modeling</a><br><br><a href="https://infosecwriteups.com/open-source-tool-for-ai-specific-threat-modeling-fast-context-aware-and-developer-friendly-2c047fdc1781?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=LLMs" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=KY3qfMIetTzAqzwquzyaqhQpl6e&amp;interestId=LLMs" rel="nofollow noopener" target="_blank">Match</a>
OWASP Foundation<p>Join Robert Hurlbut for AI Whiteboard Hacking, a 2-day hands-on threat modeling training, happening Nov 4–5 at OWASP Global AppSec USA 2025.</p><p>📍 Register: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p>Explore real-world AI threats like prompt injection and data poisoning and learn how to design secure AI systems using the proven DICE methodology.</p><p><a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a></p>
LLMsOpen Source Tool for AI-Specific Threat Modeling — Fast, Context-Aware, and Developer-Friendly Open Source Tool for AI-Specific Threat Modeling — Fast, Context-Aware, and Developer-Frie...<br><br><a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/ai-threat-modeling" target="_blank">#ai-threat-modeling</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/infosec" target="_blank">#infosec</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/open-source" target="_blank">#open-source</a> <a rel="nofollow noopener" class="mention hashtag" href="https://mastodon.social/tags/threat-modeling" target="_blank">#threat-modeling</a><br><br><a href="https://infosecwriteups.com/open-source-tool-for-ai-specific-threat-modeling-fast-context-aware-and-developer-friendly-2c047fdc1781?source=rss----7b722bfd1b8d---4" rel="nofollow noopener" target="_blank">Origin</a> | <a href="https://awakari.com/sub-details.html?id=LLMs" rel="nofollow noopener" target="_blank">Interest</a> | <a href="https://awakari.com/pub-msg.html?id=RAhYqACTamNm1kk6piqY41MdVtg&amp;interestId=LLMs" rel="nofollow noopener" target="_blank">Match</a>
Tanya Janca | SheHacksPurple :verified: :verified:<p>With 25+ presentations to choose from, I cover everything from <a href="https://infosec.exchange/tags/securecoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securecoding</span></a> and <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a> to AI risks and <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a>—always with humor, clarity, and actionable takeaways.</p><p>💡 These aren’t just talks—they’re lessons your team will remember.</p><p><a href="https://twp.ai/9PTsIv" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/9PTsIv</span><span class="invisible"></span></a></p><p>2/3</p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>I interviewed Kim Wuyts for a <a href="https://infosec.exchange/tags/Semgrep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Semgrep</span></a> fireside chat called Privacy by Design: Making Threat Modeling Work for Data Protection, and it was super fun!</p><p>Watch us here: <a href="https://twp.ai/4io15f" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4io15f</span><span class="invisible"></span></a></p><p>@KimWuyts <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a></p>
OWASP Germany Chapter :verified:<p>OWASP <a href="https://infosec.exchange/tags/Hamburg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hamburg</span></a> sports a double <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> Feature for its 15 year anniversary 🎂🎉 on July 16th</p><p>* Niklas Bunzel: AI Security &amp; Privacy: From Prompt Injection to Multimodal Evasion (on site)<br>*: Susanna Cox: Threat Modeling AI: Beyond the Hype and Theater to Proactive Security (remote)</p><p>Details: <br><a href="https://www.meetup.com/owasp-hamburg-stammtisch/events/308558262/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">meetup.com/owasp-hamburg-stamm</span><span class="invisible">tisch/events/308558262/</span></a></p><p><a href="https://infosec.exchange/tags/AiResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AiResearch</span></a> <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a></p>
MHS_Jenkins<p>We should probably all think about the intersection of <a href="https://infosec.exchange/tags/facialrecognition" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>facialrecognition</span></a>, <a href="https://infosec.exchange/tags/datingapps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datingapps</span></a>, and our current <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodeling</span></a> and make some hard choices. </p><p><a href="https://www.cbsnews.com/news/california-tinder-dating-app-facial-recognition/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cbsnews.com/news/california-ti</span><span class="invisible">nder-dating-app-facial-recognition/</span></a></p>