Header image

Workshops

Workshops

Our workshops are designed to empower development teams in their security decision making.

Cybersecurity can be challenging for developers and product owners: we know we need it, but it costs us effort and money that we might rather use for other improvements. So, it’s vital that we make good, justifiable, decisions about which security and privacy features we implement. But how should we best do this? The ground-breaking research we have been doing in the Hipster Project provides an efficient approach to do just that.

Design

Our workshops have been specifically designed with developer communities in mind. Built on our findings from a series of in-depth interviews with software developers, we have tailored our approach to suit the needs of development teams. By guiding teams through a series of structured discussions around risk, our approach strives to spark discussion to glean insight and perspectives from everyone at the table.

Process

Our workshops are intended to get teams thinking about security risks not only in the context of their company or organisation, but in relation to their system or product. When the focus shifts to the product and the end user of that product, that's a different set of risks to consider. Our workshops involve three key stages: Determining impact thresholds to assist with risk assessment; exploring risk scenario cards to establish relevant risks to your product; and calculating risk scores to help you prioritise risks.

Benefits

Our process allows you to gain a deeper understanding of potential threats your product might face. Our explorative approach enables creative investigation of vulnerabilities and facilitates an enhanced view of the threat landscape. Develop expertise in applying a structured risk assessment method to efficiently solve security problems and acquire the skills and techniques required to successfully identify and evaluate complex risks.

Your Own Workshops

Interested in running your own workshop? We've made our approach easily accessible for you to run with your team independantly. Learn how to have a series of guided discussions to identify the security and privacy problems your project might face. Use powerful risk assessment techniques to decide which cyber problems are important and which problems can reasonably be ignored. Download the Materials here.

Get involved, go through the workshop and go through those scenarios because I guarantee even if you've got 99% of those mapped, one scenario will crop up and you won't have thought about it. That could be the difference between business life and death

A quote from Jawad Bhatti Founder, Spark

Gallery

Take a look at some of our Hipster Activities over the last 18 months