If you’re a first-time threat modeler, threat modeling can seem overwhelming. Maybe you’re following one of the common threat modeling frameworks like STRIDE or OWASP. Or maybe you’ve already invested in an automated threat modeling tool like ThreatModeler. Either way, it may not be enough.

If you hope to maximize the impact of your threat modeling, what you really need is some support, guidance and access to other threat modeling resources. In this article, we share how you can have all of these through the ThreatModeler Community.

The ThreatModeler Community

The ThreatModeler Community was created with the idea that threat modeling is a practice and practitioners excel when engaging with other practitioners. To that end, the Community is designed to minimize the risk of threat modeling while simultaneously maximizing your impact.

So, what resources are available in the ThreatModeler Community?


What are the various threat modeling methodologies available? Should every threat have a security requirement? How do security issues affect your use of social media? These are just some of the discussions going on right now in the Community.

The Community is where you seek answers to questions you can’t get with Google. Where you can learn from others who have already gone down the threat modeling road you’re starting on.


The ThreatModeler Community is stocked with resources perfect for anyone new to threat modeling. There are whitepapers, data sheets, tutorials, FAQs, guidelines and best practices.

There are also vendor-specific resources including those for AWS, Azure and 14 third-party integration guides. There are over a dozen videos and lots of articles on mitigating threats. The Guides section of the Community is a great place to jump-start your threat modeling learning.


Want to know about the latest threat modeling focused tradeshows? Here’s where you can find them. Some of the events in the Events section include H-ISAC, AWS re:Invent, Cybersecurity Summit Dallas and CISO Series Hacking Secure Cloud Migration.

In the Events area, you will also gain access to ThreatModeler specific webinars, which are free to attend, and are a great way to maximize the impact of using ThreatModeler. Two recent webinars were Advancing Critical Conversations for Regulated Industries and Can Threat Modeling Really be Automated and Scaled Out to Developers? You can replay these at any time in the Community.


One of the newer areas in the Community, Groups, is meant to be a place for practitioners to congregate on specific subjects relevant to threat modeling. As the Community matures, expect to see more groups added.

Product Updates

Did you know that ThreatModeler has been granted seven patents around improving the threat modeling process? And not all of them have been incorporated yet into ThreatModeler, which means you can expect a string of product updates and improvements in the future.

The Product Updates section of the Community is where you can stay on top of the latest features in ThreatModeler.


Finally, there is ThreatModeler help in the Community, which includes the jumping off point to the support portal. If you’re already a ThreatModeler customer, here’s where you gain access to customer support.

If you’re committed to becoming an experienced threat modeler practitioner, one of the best investments you can make is spending some time in the ThreatModeler Community.

Schedule a demo today with our cybersecurity experts and fortify your operations!


ThreatModeler revolutionizes threat modeling during the design phase by automatically analyzing potential attack surfaces. Harness our patented functionalities to make critical architectural decisions and fortify your security posture.

Learn more >


Threat modeling remains essential even after deploying workloads, given the constantly evolving landscape of cloud development and digital transformation. CloudModeler not only connects to your live cloud environment but also accurately represents the current state, enabling precise modeling of your future state

Learn more >


DevOps Engineers can reclaim a full (security-driven) sprint with IAC-Assist, which streamlines the implementation of vital security policies by automatically generating threat models through its intuitive designer.

Learn more >