<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/6488a3870c304fea916f1b199fd36ee9&quot; frameborder=&quot;0&quot; width=&quot;1578&quot; height=&quot;1183&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>1183</height><width>1578</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>1183</thumbnail_height><thumbnail_width>1578</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/6488a3870c304fea916f1b199fd36ee9-7b6635266856ac1d.gif</thumbnail_url><duration>939.17</duration><title>Demonstration of DevArmor&apos;s Threat Modeling Module</title><description>In this video, I&apos;m excited to demonstrate DevArmor&apos;s Threat Modeling module, which streamlines the process of threat modeling by integrating various components like design reviews and controls generation. I walk through creating a new project focused on the OWASP Juice Shop&apos;s payments endpoint, uploading relevant documents, and generating threat model attributes using our AI agents. We identify risks, controls, and mitigation plans, ultimately preparing to implement the threat model through actionable tasks and policies. I encourage you to review the generated outputs and provide feedback to ensure accuracy and completeness. Your engagement in this process is crucial for enhancing our security posture.</description></oembed>