Threat Modeling Connect
We're a global community of threat modeling enthusiasts in application security and more. Founded in 2022 by leading threat modeling practitioners worldwide, we're all about learning, collaboration, and making threat modeling accessible to everyone. Dive into our content, join exciting events, and explore resources that empower you to kickstart or elevate your threat modeling journey.
Secure by Design in the Age of Vibe Coding: Guardrails, Prompts, and More | ThreatModCon 2025 DC
Build Fast, Think Smart: Injecting Threat Modeling Without Killing Velocity | ThreatModCon 2025 DC
Why Engineering Discipline Is the First Step toward Threat Modeling | ThreatModCon 2025 DC
Threat Modeling as a Team Sport with Security Champions & AI | ThreatModCon 2025 Washington DC
Data-Driven Insights from the State of Threat Modeling Report 2024-25 | ThreatModCon 2025 DC
The Automation Illusion? What Machines Can’t Do in Threat Modeling | ThreatModCon 2025 Washington DC
To AI or not AI Dos & Don'ts for applying AI to Threat Modeling | ThreatModCon 2025 Washington DC
Threat Centric AppSec: Automating Secure by Design in the AI Era | ThreatModCon 2025 Washington DC
A Generative Approach to Modeling Emergent Threats in Multi-Agentic Systems | ThreatModCon 2025 DC
Teach to Sell: Leading Security Conversations with Influence in Threat Modeling and Secure by Design
Elevation of MLsec – A card game for threat modeling machine learning | ThreatModCon 2025 Barcelona
Enhancing Security in Voice and Audio Systems: A Hybrid Threat Modelling Approach
Threat Modeling Digital Credentials: What Could Go Wrong?
Scaling supply chain security using Threat Modeling | ThreatModCon 2025 Barcelona
Listening for effective threat modeling
Publish Your Threat Models!
ThreatModCon 2025 Barcelona Highlights - Threat modeling under the Spanish sun!
State of Threat Modeling 2024-2025 Release Webinar: The First-Ever Community-led SOTM Report
TMC London Meetup: The C-Suite buy in for Threat Modelling
What’s next for the Threat Modeling Hackathon?
TMC Threat Modeling Hackathon 2025 Opening Ceremony
Only Fools Rush into Love and Secure Design by Avi Douglen - Threat Modeling Hackathon 2025 Keynote
TMC Threat Modeling Hackathon 2025 Highlights
Threat Modeling Hackathon 2025 Closing Ceremony
Developing a 'threat modeling mindset' following four steps of the threat modeling process
Q&A with Caroline Wong on Success and Metrics for Threat Modeling
Success and Metrics for Threat Modeling with Caroline Wong
Threat modeling in the age of AI - 3 steps to understanding AIML system attack surfaces
Enhancing Threat Modeling with object-oriented programming (OOP) principles