Overview
Learn cybersecurity threat modelling, risk assessment, and security validation through hands-on labs and practical scenarios. Experience hands-on labs replicating common vulnerabilities surfaced through Government Bug Bounty Programme, compete in a gamified 'Capture-the-Risk' challenge, and present threat-informed risk assessment projects. This intensive workshop combines theoretical foundations with extensive practical application, culminating in an open book assessment to demonstrate your newfound skillsets.
Key Takeaways
At the end of the programme, you will be able to:
- Apply threat modelling techniques to identify and analyse key cybersecurity threats as part of risk assessment
- Integrate threat modelling outcomes into the development of System Security Plans (SSPs) to strengthen risk management practices
- Scope, assess, and validate security assessments, including penetration testing engagements, to ensure the quality and relevance of findings
- Conduct threat-informed risk assessments and effectively communicate results through collaborative and scenario-based exercises
Who Should Attend
- Please refer to the job roles section.
- ICT&SS Professionals keen on threat modelling and/or in the following job roles – CISOs*, Cybersecurity Engineers*, Cybersecurity Policy Officers as well as Cybersecurity Operations Specialists (*CTM is mandatory for these job roles).