Chris Romeo is going on a journey. A journey to understand threat modeling at the deepest levels. He thought he understood threat modeling but realized he could go deeper. Chris shares his findings and talks with some of the best-known experts in the space to experience continuous learning. Join along for the ride -- you will learn something. Chris Romeo is the CEO of Devici (THE Threat Modeling Company) and a General Partner at Kerr Ventures.
…
continue reading
1
Gavin Klondike -- Threat modeling for large language model applications
51:01
51:01
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
51:01
In this episode of the Threat Modeling Podcast, host Chris Romeo takes listeners on a journey through the intricate world of threat modeling. Joined by senior security consultant Gavin Klondike, the episode delves into Gavin's experiences and insights into threat modeling, particularly in the context of artificial intelligence and machine learning.…
…
continue reading
1
Nandita Rao Narla -- Privacy Threat Modeling Wins, Losses, and Tools
7:08
7:08
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
7:08
In this podcast episode, Nandita Rao Narla explores the reasons why privacy threat modeling programs often fail, such as being expensive with a lot of friction in the development lifecycle, misalignment with organizational strategies focused on compliance rather than risk, and difficulty demonstrating a clear return on investment. Nandita highlight…
…
continue reading
Nandita Rao Narla introduces the basics of privacy in software. She discusses privacy threats, privacy threat modeling, and privacy by design. Suppose you write or handle software that touches user information. In that case, you need to understand privacy, how to assess and mitigate privacy concerns, and know when to implement privacy concerns into…
…
continue reading
1
Akira Brand -- Gaining Experience by Threat Modeling
12:09
12:09
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
12:09
Akira Brand joins Chris to talk about her journey into threat modeling, her early experiences, some lessons learned, and how she knew her threat model was successful. Akira's experiences emphasize the importance of collaboration, understanding the application, and using tools and diagrams to aid the process. Akira is a visual thinker and draws para…
…
continue reading
1
Dr. Michael Loadenthal -- Intersectional, Harm Reduction Approach to Threat Modeling
19:35
19:35
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
19:35
Dr. Michael Loadenthal specializes in threat modeling beyond the conventional realm of technology. Companies today face multifaceted challenges, including political, legal, and technical threats. Solutions to these problems can also be varied. A comprehensive threat model should consider many dimensions, such as political, legal, ethical, and socia…
…
continue reading
The AppSec community agrees that threat modeling is essential, but many struggle to implement it effectively. Using insight from the LinkedIn community, Chris lays out a comprehensive Threat Modeling strategy to guide AppSec teams to success in this critical discipline. Before starting, consider the organization's culture, tech debt, and current ri…
…
continue reading
Engineering-led, developer-focused, or software-centric threat modeling: they all have software in common. Composing software into functions through the user story's lens is important. Farshad Abasi shares his journey from being a software engineer to forming a global AppSec team at HSBC Bank. Farshad expresses the importance of asset-based threat …
…
continue reading
What is the connection between threat modeling and product development? How can you apply lean product management and focus on understanding the user's needs while still threat modeling? Prepare to explore product-led threat modeling. The conversation delves into the importance of taking responsibility for security and using the language of the tea…
…
continue reading
1
The Four Question Framework with Adam Shostack
12:00
12:00
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
12:00
In this episode, we discuss the four-question framework for threat modeling with its creator, Adam Shostack. We dive deep into the meaning and purpose of each question and how they simplify the threat modeling process. The four questions are: 1) What are we working on? 2) What can go wrong? 3) What are we going to do about it? 4) Did we do a good j…
…
continue reading
In episode one of the Threat Modeling podcast, host Chris Romeo explores various definitions of threat modeling gathered from industry experts. The podcast discusses whether risk assessment and threat modeling are the same, the essence of threat modeling, collaboration and documentation, identifying and mitigating threats early, the Five W's and an…
…
continue reading
On this podcast, we'll journey together into the world of threat modeling. On this journey, we'll learn the history of threat modeling, hear from influential folks, explore the available methodologies and tools, and have fun. My name is Chris Romeo, and I've been threat modeling my entire 25+ year career in security. In addition, I host other podca…
…
continue reading