WATCH THIS ON-DEMAND WEBCAST TODAY!
No system or device sits in isolation on your network, and attackers use the interconnectedness of systems to move laterally and find points of exposure to work from. Threat modeling is an important part of deploying new platforms, but it can be an overwhelming process.
Hear from our security experts on what’s new in the world of threat modeling and threat simulation.
Speakers: Wade Woolwine, Director of Managed Services, Rapid7 and Guillaume Ross, Senior Security Consultant, Rapid7
Take the wheel with Rapid7
Like this? Then you’ll dig the rest of our Security Road Trip series, serving up the latest research, best practices and how-tos to help you better steer your security program.
Fill out the form to register for the webcast
WATCH THIS ON-DEMAND WEBCAST TODAY!
No system or device sits in isolation on your network, and attackers use the interconnectedness of systems to move laterally and find points of exposure to work from. Threat modeling is an important part of deploying new platforms, but it can be an overwhelming process.
Hear from our security experts on what’s new in the world of threat modeling and threat simulation.
![]() |
Wade Woolwine Director of Managed Services Rapid7 |
![]() |
Guillaume Ross Senior Security Consultant Rapid7 |
Take the wheel with Rapid7
Like this? Then you’ll dig the rest of our Security Road Trip series, serving up the latest research, best practices and how-tos to help you better steer your security program.