Start your future-proofed modeling now
and get the STRIDE Model Addin for EA
2017: 30% increase in cyber crime in Austria, and Advanced attacks (APTs) increase in scope and in frequency
Source: Austrian Security Report 2017, Gridling , BVT, BMI, Vienna Cyber Security Week 2018, 29.1 – 2.2, Wien, Austria
£71 million lost by European firms due to ransomware downtime between 2016 and 2017 businesses of all sizes less than 33% of attacks are reported to the authorities
Source: Data Inc. Study 2018
Microsoft: 1500 people focusing on security, 1 billion investment in cybersecurity-without change of concept no cyber security is possible
Source: N. Malisevic, Microsoft, Vienna Cyber Security Week 2018, 29.1 – 2.2, Wien, Austria
The Internet of Things (IoT) will be a security disaster. Cyber warfare will be the norm rather than the exception in conflicts
Source: Adi Shami , Financial Crypto Conference 2016
The biggest security crises since WW II – 30 nations develop cyber war capabilities
Source: OSCE, Vienna Cyber Security Week 2018, 29.1 – 2.2, Wien, Austria
- Servers are wide open to the internet with no authentication.
- Backdoor „service“ passwords on systems are published in easily obtained service manuals.
- Some devices have nothing even resembling security.
- Increased usage of Third Party Products. Commercial and Open Source.
- Standalone Devie Vulnerabilities – Firmware can be maliciously altered and uploaded, replacing authentic file.
- …. you name it
Where do we
see a need for
Understanding problem before
Proactively identify potential security
threats and address them prior to production
Testing as early as possible and
Pushing understanding and demand
for security further
Why Threat Modeling?
Avoid introducing vulnerabilities
Brings solid foundation for building secure and safety solutions addressing confidentiality, integrity and availability
Identify vulnerabilities in an existing solution
Threat modeling with STRIDE
STRIDE is an acronym for the threat types of Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of privilege
More important than fitting a threat to a category is using the model to help you describe the threat and design an effective mitigation.
Cyber Security Modeling
Where we are today and where we are heading
Take a look at our Cyber Security Modeling Video from Bob Hruska.
In this video you get updatet about:
- how to build up a security culture to save money and reputation
- what are the challenges
- why should we care
- an introduction to Threat Modeling
- a demo with EA
- and much more
Use the best tool to build up your Cyber Security future
The future of system development, project management and company analysis.
Threat Modeling for Specific Industries
Generic rules for potential threat analysis
Download it here!
Coming Soon in Collaboration with AIT
ThreatGet for Automotive
ThreatGet for Aviation
ThreatGet for Transportation
ThreatGet for Critical Infrastructure (e.g. energy sector)
ThreatGet for Internet of Things (ISO27000)