top of page
Artboard 1.png
resilient logo 2.png

The average data breach costs $4.24 Million, and 80% of data breaches target SaaS.

Huddle Workshops train SaaS startups to predict and prevent software attacks with Secure Design.

Artboard 2.png
Artboard 3.png

Building Something

In the rush to ship, it’s hard to find time to think about protecting your software from cyber attackers. That’s why 43% of all cyberattacks target small businesses and sadly, 60% of those businesses never recover. But that doesn’t have to be you.

How Huddles Work

Huddles can take place in-person, virtually, or via a hybrid model where some team members are co-located while others join in virtually.

The flow is kept super simple so we can focus on what matters and deliver value:


Once you're at the Huddle:

Quick intro of Huddle participants.


An overview of your startup's business case, market, and goals.


Product Architecture deep dive. We use your product architecture so you get maximum value right away.

We never share your data and always sign an NDA.


Software security strategy and secure design working session.


Wrap up and review of future considerations.

Security analysis and mitigations are shared with your team.

Artboard 5.png

Teach your team to get into the attacker’s mind before they strike, with a Huddle Workshop.

Artboard 6.png

Examples of Technologies We Cover

Including, but not limited to…

What You'll Get?

At the end of a Huddle, your team will have identified:

Assets: The prized security jewels that you must protect.

Threats: The probable attack types that will be performed on your system.

Attack Points: The places where attackers will attempt to access your system.

Mitigations: The secure design mitigations that protect your assets, defend your attack surfaces, and neutralize threats.

Attacker Personas: The types and capabilities of attackers who are interested in your SaaS.

Future Research: Critical security considerations or implications for your system, that your team is yet to think through, and must.

It's NOT Theory.

By using your product architecture for the workshop, your team has tangible and relevant insights.

Designers Looking at the Computer


Break the silos, get software stakeholders together, and learn new things.

Online meeting


Designed for modern teams, Huddles can take place in person, online, or via a combination of both.

Digital Book


Ever discussed tech over coffee? Now, add architecture, security, and a whiteboard → Huddle.

Chart analysis


We will identify what you can fix right away and what you need to plan for. No vague suggestions here.

Computer Class


Forget boring training slides, we’ll analyze the real thing and address relevant issues.

A man pointing at his laptop screen


No, we don’t hawk security vulnerabilities by the pound. If there’s no business risk, we throw it out.

Artboard 7.png


Meet a couple of our select instructors:

Brook's bio pic.jpeg

Brook Schoenfield


Damilare Fagbemi

Our Chief Security Architect, Brook, has created 1000s of secure software designs and authored 6 software security books. 

Previously lead secure design at Intel, McAfee, Cisco, and Autodesk.

Our CEO, Dam, got into security over a decade ago when his startup app was hacked. He has since taught secure design across 4 continents.

Previously lead software security teams at Intel and McAfee.

Artboard 9.png
Artboard 8.png

Hear what our customers are saying…


“It was amazing and we really did get a lot out of it! The topics covered led to design discussions and changes among the dev team - only enhancing our product and its risk stance.”



Co-Founder @ Disca

“Very professional and knowledgeable. These guys go above and beyond to ensure you are satisfied..”