Izar Tarandach 🎗️ (@izar_t) 's Twitter Profile
Izar Tarandach 🎗️

@izar_t

Retweet!=endorsement.I follow smart people and tweet about appsec.
OWASP pytm Lead|Event Committee Chair (2024)
[email protected]

ID: 29808735

linkhttps://threatmodeling.dev calendar_today08-04-2009 20:16:41

2,2K Tweet

909 Followers

463 Following

Avi Douglen (@sec_tigger) 's Twitter Profile Photo

In this expanded edition with Kim Wuyts, exclusive to Blackhat #BHUSA 2025, expect high impact sessions, real-world examples, and collaborative exercises designed to give you actionable takeaways to apply immediately - whether you’re in AppSec, software architecture, or privacy.

OWASP® Foundation (@owasp) 's Twitter Profile Photo

OWASP is teaming up with InfoSecMap to make cybersecurity events & resources more accessible, inclusive, and global - including OWASP Chapters & Events! No marketing, pay-to-play nonsense - just human curated community & events. Explore the brand new OWASP hub now:

OWASP is teaming up with <a href="/InfoSecMap/">InfoSecMap</a> to make cybersecurity events &amp; resources more accessible, inclusive, and global - including OWASP Chapters &amp; Events!

No marketing, pay-to-play nonsense - just human curated community &amp; events. 
Explore the brand new OWASP hub now:
Threat Modeling Connect (@tmconnecthq) 's Twitter Profile Photo

Missed #ThreatModCon Barcelona? You got another shot! This November 7-8, we’re bringing the same high-energy, expert-packed, community-first experience to Washington, DC. AND right now? Tickets are 50% off. 😲 Don’t miss out twice: hubs.li/Q03vx0Jg0

Missed #ThreatModCon Barcelona? You got another shot!

This November 7-8, we’re bringing the same high-energy, expert-packed, community-first experience to Washington, DC.

AND right now? Tickets are 50% off. 😲

Don’t miss out twice: hubs.li/Q03vx0Jg0
The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

Vibe coding: does it promise efficiency or introduce new vulnerabilities? We’re discussing how AI-generated code and vibe coding could affect development and cause new security implications. Listen here: youtu.be/WpCdLJCS5eY

Vibe coding: does it promise efficiency or introduce new vulnerabilities?  We’re discussing how AI-generated code and vibe coding could affect development and cause new security implications. Listen here: youtu.be/WpCdLJCS5eY
Kim Wuyts (@wuytski) 's Twitter Profile Photo

And while this video may look suspiciously like a parody of a certain type of security promo... 🧡 it’s a loving homage 🧠 with serious content underneath 💻 and now, available from anywhere. 👇 Sign up for our two-day virtual Black Hat training blackhat.com/us-25/training…

OWASP® Foundation (@owasp) 's Twitter Profile Photo

Join Kim Wyuts and Avi Douglen on November 5 at OWASP Global AppSec USA 2025 for a powerful 1-day, hands-on training that goes beyond policies and into real privacy engineering. Register now! owasp.glueup.com/event/131624/r… You'll learn how to: 🔍 Map and analyze data flows ⚙️ Spot and

Join Kim Wyuts and Avi Douglen on November 5 at OWASP Global AppSec USA 2025 for a powerful 1-day, hands-on training that goes beyond policies and into real privacy engineering.

Register now! owasp.glueup.com/event/131624/r…

You'll learn how to:
🔍 Map and analyze data flows
⚙️ Spot and
Kim Wuyts (@wuytski) 's Twitter Profile Photo

Privacy, threat modeling, and Tanya Janca | Shehackspurple ! You can imagine how much I enjoyed this webinar.🤩 Missed it? Good news. The recording is available now. Thanks for the fun conversation, Tanya 💜 youtu.be/mC1TGCFjaOU?si…

Privacy, threat modeling, and <a href="/shehackspurple/">Tanya Janca | Shehackspurple</a> !
You can imagine how much I enjoyed this webinar.🤩

Missed it? Good news. The recording is available now. 

Thanks for the fun conversation, Tanya 💜

youtu.be/mC1TGCFjaOU?si…
The Security Table Podcast (@sectablepodcast) 's Twitter Profile Photo

Join us and our guest Petra Vukmirovic as we dive into the world of threat modeling. Petra shares about her groundbreaking project: building a library of threat models. We’re discussing the challenges and opportunities. Listen here: youtu.be/uN5W5YAulD0

Join us and our guest Petra Vukmirovic as we dive into the world of threat modeling. Petra shares about her groundbreaking project: building a library of threat models. We’re discussing the challenges and opportunities. Listen here: youtu.be/uN5W5YAulD0
The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

We’re discussing the ever-evolving world of AI in AppSec with our guest, Sarah Jane Madden. We explore the impact of AI on software development and security and how to navigate these dynamic changes. Listen to the episode here: youtu.be/GsJ8tbcjUuk

We’re discussing the ever-evolving world of AI in AppSec with our guest, Sarah Jane Madden. We explore the impact of AI on software development and security and how to navigate these dynamic changes. Listen to the episode here:  youtu.be/GsJ8tbcjUuk
The Security Table Podcast (@sectablepodcast) 's Twitter Profile Photo

Our special guest, Petra Vukmirovic explains the idea of an open-source threat modeling library and the potential impact on enhancing security practices. Check out the episode now to learn more about the project and how it could help you. Watch it here: youtu.be/uN5W5YAulD0

The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

Our guest, Sarah-Jane Madden gives her take on all the change we have going on all around us including AI and its effect on the threat modeling world. Listen to the full episode here: youtu.be/GsJ8tbcjUuk #ThreatModeling #AI #Innovation

OWASP® Foundation (@owasp) 's Twitter Profile Photo

🔐 Ready to go beyond academic theory and into real-world AI security testing? Join Jason Haddix on November 4–5 at OWASP Global AppSec USA 2025 for a 2-day, hands-on training: Attacking AI. This intermediate-level course is packed with case studies, real methodologies, and

🔐 Ready to go beyond academic theory and into real-world AI security testing?

Join Jason Haddix on November 4–5 at OWASP Global AppSec USA 2025 for a 2-day, hands-on training: Attacking AI.

This intermediate-level course is packed with case studies, real methodologies, and
Jason Haddix (@jhaddix) 's Twitter Profile Photo

This will be my 1st live-live cohort of Attacking AI 🎉 Not only will I be teaching the course, but I will also be including access to my new in-beta course: "AI Engineering - a Prompt and Context Engineering Masterclass" For all students who come! See you in DC 😀

Threat Modeling Connect (@tmconnecthq) 's Twitter Profile Photo

Join the world's largest threat modeling conference in DC this November 7-8 at half price! 🤩 Super early bird tickets are almost gone. Grab yours now: hubs.li/Q03vxdyx0 #ThreatModCon #ThreatModeling #SecurebyDesign #Cybersecurity

Join the world's largest threat modeling conference in DC this November 7-8 at half price! 🤩 

Super early bird tickets are almost gone. Grab yours now:
hubs.li/Q03vxdyx0

#ThreatModCon #ThreatModeling #SecurebyDesign #Cybersecurity
Threat Modeling Connect (@tmconnecthq) 's Twitter Profile Photo

Threat modeling is a journey–and every step counts. This year’s #ThreatModCon theme, “Threat Modeling Journeys,” is all about real-world lessons – successes and failures – that move the field forward. 👉 Submit your talk and be part of the conversation: hubs.li/Q03w4dmr0

OWASP® Foundation (@owasp) 's Twitter Profile Photo

The OWASP Community Room Demos & Roundtables at DEF CON are where the magic happens—live demos, real talk, and next-level insights 💥 Curious? Pull up, learn, share, and connect. See you in Vegas! 🎲✨ Thank you to Josh Grossman 👻 (tghosth) InfoSecMap & Spyros G. #dc33 #HackerSummerCamp

The OWASP Community Room Demos &amp; Roundtables at <a href="/defcon/">DEF CON</a>  are where the magic happens—live demos, real talk, and next-level insights 💥

Curious? Pull up, learn, share, and connect. See you in Vegas! 🎲✨ Thank you to <a href="/JoshCGrossman/">Josh Grossman 👻 (tghosth)</a> <a href="/InfoSecMap/">InfoSecMap</a> &amp; Spyros G. #dc33 #HackerSummerCamp
The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

Is your security dashboard lying? Our guest today, Aram Hovsepyan helps us uncover the myths behind common security metrics and shares how to truly assess risk and readiness. Listen to the new episode here: youtu.be/3z10qVEFWNM

Is your security dashboard lying? Our guest today, Aram Hovsepyan helps us uncover the myths behind common security metrics and shares how to truly assess risk and readiness. Listen to the new episode here: youtu.be/3z10qVEFWNM
Kim Wuyts (@wuytski) 's Twitter Profile Photo

Join us Friday at 10:15 in the @appsecvillage DEF CON for our "Context & Cringe: a privacy threat modeling" workshop with memes 😺, a brand new card game 🃏, and hands-on LINDDUN GO 🚗. @avid #DEFCON33 #AppSec #PrivacyEngineering

Join us Friday at 10:15 in the @appsecvillage <a href="/defcon/">DEF CON</a> for our "Context &amp; Cringe: a privacy threat modeling" workshop with memes 😺, a brand new card game 🃏, and hands-on LINDDUN GO 🚗.

@avid
#DEFCON33 #AppSec #PrivacyEngineering