
Overview
A three-hour interactive session that takes you from the first steps in model-based cybersecurity to mastering the effectiveness of Protection attack trees in a live cloud-hosted environment. You will learn to choose between creating individual threat scenarios and leveraging attack trees for attack path generation.
What Attendees Will Learn
- Get an overview of Cybersecurity analysis as per DO-326B/356A and ED-202B/203A
- Learn how system architectures are modeled in SysML
- Import Safety Failure Conditions and identify Threat Conditions for your System
- Create Threat Scenarios and apply the Effectiveness of Protection (EoP) method to quantify their acceptability
- Use attack trees to represent your system behavior, generate attack paths and review the EoP results
- Document your analysis in easily adjustable reports for hand-over to authorities and customers
Who Should Attend
Cybersecurity Analysts, Security Leads, Security Architects, Systems Engineers
Speakers
- Sina Hashemi, Raqiq Islam, Olivier Morisot
Date / Time: April 14, 2026, 12:00 PM - 3:00 PM EST
Venue: Virtual
- Cost:
No reviews available for this learning resource.



