

Catch the recap
Relive the energy and key insights of the event.
Discover the top takeaways from our volunteer Omar Saenz.
Read the blog post.
Watch the recordings
Become a Sponsor
Join the ThreatModCon sponsor network to feature your brand with our community.
Agenda
Kick off your ThreatModCon 2024 Lisbon experience with a Sunset Cruise along the Tagus River, connecting with speakers and fellow attendees over welcome drinks and breathtaking views.
Then brace yourself for an action-packed day filled with insights, networking opportunities, and fresh ideas to advance your threat modeling capabilities. Engage in the interactive "non-keynote" keynote session led by thought leaders in the threat modeling space (check out ThreatModCon 2023's keynote for a taste). Explore the latest trends, techniques, best practices, and tried-and-true strategies for enhancing threat modeling capabilities through seven expert talks, and two hands-on workshops.
Friday
June 27
Saturday
June 29
Click on a session name to find out more...
Speakers
Gain invaluable insights from top industry experts, seasoned practitioners, and thought leaders in threat modeling across technology, security consulting, academia, and beyond. Explore cutting-edge trends, delve into real-world case studies, and discover how these experts have empowered organizations to advance their threat modeling capabilities.

Jonathan is from Montreal, Canada and is passionate about Application Security. He enjoys architecture analysis, code review, threat modeling and debunking security tools. Jonathan holds a bachelor's degree in Software Engineering and has 20 years of experience in IT and Security.

Isabel Barberá is the author of PLOT4ai. She is also one of the members of ENISA Working Group on Data Protection Engineering and a National Expert at ISO/CEN/CENELEC working on the development of standards related to AI and privacy engineering.

Sebastien Deleersnyder, CTO and co-founder of Toreon, has a deep cybersecurity background. He has trained many developers in secure coding practices, founded the Belgian OWASP chapter, and contributed significantly to OWASP projects like SAMM. Now, he’s focusing on integrating application security into DevOps and expanding the reach of threat modeling.
.jpg)
Irene Michlin is an application security lead at Neo4j. Before going into application security, Irene worked as a software engineer, architect, and technical lead at companies ranging from startups to corporate giants. Her professional interests include securing development life-cycles and architectures. After years of AppSec consultancy, she is back to an in-house role, where she can apply all that she’s learned.

Growing up in a military family, thinking about threats and security has always been a part of Roos Hubrechtsen’s life. This led her to pursue a career as a cyber security architect where she has had the privilege to work on many projects ranging from hacking cars to rebuilding hacked companies.

Dr. Michael Loadenthal is a Professor of Research at the Center for Cyber Strategy & Policy, at the University of Cincinnati. He serves as a SME focused on security, technology, and extremism, advising social movements, journalists, and high-risk individuals to protect themselves off and online.

Frank Simorjay is a Principal Program Manager for the Industry Cloud Solutions team at Microsoft. He is a cloud security architect and content developer with an extensive library of security content for Microsoft. He is a CISSP and ISSA Distinguished Fellow.

James Rabe is the Head of Global Services at IriusRisk. He is focused on building effective threat modeling programs through pragmatic, lean, and scalable processes. Secure by Design is the outcome and threat modeling is the pathway to get there!

Adam is the author of Threat Modeling: Designing for Security, and Threats: What Every Engineer Should Learn from Star Wars, and the first recipient of the Adam Shostack Award for Threat Modeling.

With a strong interest in cyber security matters, ranging from high-level architectural challenges to technical implementations, Michael Boeynaems is the founder of Splynter where he has the opporutnity to prepare organizations end-to-end for future threats that are approaching quickly.

14 years in the tech industry working in security and engineering roles with a decade of experience as a threat modeling practitioner. Currently leading the Product Security function at Snyk, a cybersecurity company that builds developer-first security products.

Kim Wuyts is a leading privacy engineering expert with over 15 years of experience in security and privacy. Before joining PwC as Manager Cyber & Privacy, Kim was a senior researcher at KU Leuven where she led the development and extension of LINDDUN, a popular privacy threat modeling framework. Her mission is to raise privacy awareness and get organizations to embrace privacy engineering best practices.