Discussion
Loading...

Post

Log in
  • Sign up
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
NorthSec
NorthSec
@NorthSec@infosec.exchange  ยท  activity timestamp 9 hours ago

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (๐Ÿฎ/๐Ÿญ๐Ÿฎ): "Beyond Whiteboard Hacking: Master AI-Enhanced Threat Modeling" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Steven Wierckx (Toreon)

๐Ÿ“… Dates: May 11 and 12, 2026 (2 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: On-Site

Description: "๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ต๐˜ณ๐˜ข๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ข๐˜ฌ๐˜ฆ๐˜ด ๐˜บ๐˜ฐ๐˜ถ ๐˜ฅ๐˜ฆ๐˜ฆ๐˜ฑ ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ธ๐˜ฐ๐˜ณ๐˜ญ๐˜ฅ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ฎ๐˜ฐ๐˜ฅ๐˜ฆ๐˜ญ๐˜ช๐˜ฏ๐˜จ, ๐˜ค๐˜ฐ๐˜ฎ๐˜ฃ๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ฉ๐˜ข๐˜ฏ๐˜ฅ๐˜ด-๐˜ฐ๐˜ฏ ๐˜ฆ๐˜น๐˜ฆ๐˜ณ๐˜ค๐˜ช๐˜ด๐˜ฆ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ณ๐˜ฆ๐˜ข๐˜ญ-๐˜ธ๐˜ฐ๐˜ณ๐˜ญ๐˜ฅ ๐˜ด๐˜ค๐˜ฆ๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฐ๐˜ด. ๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ฉ๐˜ข๐˜ฏ๐˜ฅ๐˜ด-๐˜ฐ๐˜ฏ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ฎ๐˜ฐ๐˜ฅ๐˜ฆ๐˜ญ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ณ๐˜ข๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ณ๐˜ด ๐˜ข๐˜ฏ ๐˜ช๐˜ฎ๐˜ฎ๐˜ฆ๐˜ณ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ช๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ, ๐˜จ๐˜ณ๐˜ฐ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ 25 ๐˜บ๐˜ฆ๐˜ข๐˜ณ๐˜ด ๐˜ฐ๐˜ง ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ต๐˜ช๐˜ด๐˜ฆ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ณ๐˜ฆ๐˜ง๐˜ช๐˜ฏ๐˜ฆ๐˜ฅ ๐˜ง๐˜ฐ๐˜ณ ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ ๐˜ข ๐˜ฅ๐˜ฆ๐˜ค๐˜ข๐˜ฅ๐˜ฆ ๐˜ฐ๐˜ง ๐˜ฅ๐˜ฆ๐˜ญ๐˜ช๐˜ท๐˜ฆ๐˜ณ๐˜บ ๐˜ข๐˜ต ๐˜‰๐˜ญ๐˜ข๐˜ค๐˜ฌ ๐˜๐˜ข๐˜ต, ๐˜ข๐˜ท๐˜ฐ๐˜ช๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ข ๐˜ญ๐˜ฆ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ-๐˜ฉ๐˜ฆ๐˜ข๐˜ท๐˜บ ๐˜ข๐˜ฑ๐˜ฑ๐˜ณ๐˜ฐ๐˜ข๐˜ค๐˜ฉ (70% ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ฆ ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ด๐˜ฆ ๐˜ช๐˜ด ๐˜ง๐˜ฐ๐˜ค๐˜ถ๐˜ด๐˜ฆ๐˜ฅ ๐˜ฐ๐˜ฏ ๐˜ฆ๐˜น๐˜ฆ๐˜ณ๐˜ค๐˜ช๐˜ด๐˜ฆ๐˜ด ๐˜ต๐˜ฐ ๐˜ณ๐˜ฆ๐˜ช๐˜ฏ๐˜ง๐˜ฐ๐˜ณ๐˜ค๐˜ฆ ๐˜ญ๐˜ฆ๐˜ข๐˜ณ๐˜ฏ๐˜ช๐˜ฏ๐˜จ). ๐˜‰๐˜บ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฆ๐˜ฏ๐˜ฅ ๐˜ฐ๐˜ง ๐˜ต๐˜ฉ๐˜ช๐˜ด ๐˜ต๐˜ณ๐˜ข๐˜ช๐˜ฏ๐˜ช๐˜ฏ๐˜จ, ๐˜บ๐˜ฐ๐˜ถ ๐˜ธ๐˜ช๐˜ญ๐˜ญ ๐˜ธ๐˜ข๐˜ญ๐˜ฌ ๐˜ข๐˜ธ๐˜ข๐˜บ ๐˜ฏ๐˜ฐ๐˜ต ๐˜ซ๐˜ถ๐˜ด๐˜ต ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ญ๐˜ฆ๐˜ฅ๐˜จ๐˜ฆ, ๐˜ฃ๐˜ถ๐˜ต ๐˜ต๐˜ฉ๐˜ฆ ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜ต๐˜ฐ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ฆ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ฎ๐˜ฐ๐˜ฅ๐˜ฆ๐˜ญ๐˜ช๐˜ฏ๐˜จ ๐˜ฆ๐˜ง๐˜ง๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ๐˜ญ๐˜บ ๐˜ช๐˜ฏ ๐˜บ๐˜ฐ๐˜ถ๐˜ณ ๐˜ฐ๐˜ณ๐˜จ๐˜ข๐˜ฏ๐˜ช๐˜ป๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ. "
๐Ÿ”— Full Training Details: https://nsec.io/training/2026-beyond-whiteboard-hacking-master-ai-enhanced-threat-modeling/

๐Ÿ‘จโ€๐Ÿซ About the trainer:
Steven Wierckx (Toreon) is a seasoned software and security tester with 15 years of experience in programming, security testing, source code review, test automation, functional and technical analysis, development, and database design. Steven shares his web application security passion by writing about and through training on testing software for security problems, secure coding, security awareness, security testing, and threat modeling. Heโ€™s the OWASP Threat Modeling Project Lead and organises the BruCON student CTF. Last year, he spoke at Hack in the Box Amsterdam, hosted a workshop at BruCON, and provided threat modeling training at OWASP AppSec USA and Oโ€™Reilly Security New York.

#NorthSec #cybersecurity #threatmodeling #AIsecurity #LLM #DevOps #securitybydesign

3 media
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
NorthSec 2026

Beyond Whiteboard Hacking: Master AI-Enhanced Threat Modeling

This training takes you deep into the practical world of threat modeling, combining hands-on exercises and real-world scenarios. This hands-on threat modeling training offers an immersive experience, grounded in 25 years of practical expertise, and refined for over a decade of delivery at Black Hat, avoiding a lecture-heavy approach (70%...
  • Copy link
  • Flag this post
  • Block

Indieweb Studio

This is a relaxed, online social space for the indieweb community, brought to you by indieweb.social.

Please abide by our code of conduct and have a nice time!

Indieweb Studio: About ยท Code of conduct ยท Privacy ยท Users ยท Instances
Bonfire social ยท 1.0.2-alpha.7 no JS en
Automatic federation enabled
Log in Create account
  • Explore
  • About
  • Members
  • Code of Conduct