Schedule a meeting with us at RSA to discuss #EasyThreatModeling

 | Conferences, Social Actions

The Continuum Security team will be at RSA in San Francisco to answer all your threat modeling and DevSecOps questions.  Threat Modeling is often seen as a complex activity that can only be performed by skilled security analysts who have to invest significant time and energy into producing a useful threat model and its corresponding security requirements.

Our IriusRisk platform vastly simplifies and speeds up this process so that developers themselves can generate their own security requirements based on the rules and policies established by the security team.  It’s one more important step towards Self Service Application Security.  Some of the exciting new features included in IriusRisk are:

  • Diagramming with DFDs as a compliment to our standard questionnaire based approach.  See a quick demo of this feature here.
  • Addition of the EU GDPR Risk Patterns to our knowledge base to help guide your development teams in building GDPR compliant applications.
  • Ability to import vulnerability results from both Fortify SCA and Fortify Software Security Centre.  A brief demo of this feature can be viewed here.

IriusRisk’s design and roadmap is partner friendly, so if you’d like to meet up and discuss a relationship with us, or if you’d just like to meet the founders and understand more about how we can help you scale threat modeling, please get in touch to schedule a meeting.

If you’d like to swing by the booth, we’re at the “Pavilion of Spain” at the South Expo #2125.

Did you like this article?

YOU MAY ALSO LIKE
  • BDD-Security now available in Docker
    BDD-Security now available in DockerBDD-Security is now easier to configure and launch from a Docker container. Because BDD-Security stores most of its configuration inside a config file (config.xml), it was cumbersome to change the parameters when launching the Docker container. To solve this we have now made it easier by allowing all of the config.xml attributes to be set […]READ MORE
  • Why invest in a threat modeling tool?
    Why invest in a threat modeling tool?Over on the Leviathan Security blog Crispin Cowan pens his thoughts on the “Calculus of Threat Modelling” within which he makes this comment: There are many threat modeling tools available, but they are really just substitutes for threat modeling best practice, which is for a threat modeling expert to meet with engineers who are experts on the […]READ MORE
  • Continuum Security Interview with Adam Shostack
    Continuum Security Interview with Adam ShostackAt the recent Open Security Summit we had the great pleasure of interviewing Adam Shostack about his keynote presentation “A seat at the table” and the challenge of getting security involved in product and application design. We covered numerous topics from the benefits brought to business by threat modeling to pooping unicorns. Adam is a member of our […]READ MORE