The Threat Modeling Manifesto – Part 2

24/11/2020 24 min
The Threat Modeling Manifesto – Part 2

Listen "The Threat Modeling Manifesto – Part 2"

Episode Synopsis

This is part two of the story of a diverse group of security and privacy people that love threat modeling and gathered to define threat modeling, encourage people to threat model, help them succeed, and change the world. This is our story of the Threat Modeling Manifesto. In this episode, we move on from definition to working through the values and principles that make up threat modeling, and then we ship the product.The working group of the Threat Modeling Manifesto consists of individuals with years of experience in threat modeling for security or privacy.Zoe BraitermanAdam ShostackJonathan MarcilStephen de VriesIrene MichlinKim WuytsRobert HurlbutBrook S.E. SchoenfieldFraser ScottMatthew ColesChris RomeoAlyssa MillerIzar TarandachAvi DouglenMarc FrenchOther episodes on threat modeling:The Threat Modeling Manifesto – Part 1Adam Shostack — Remote Threat ModelingKim Wuyts — Privacy Threat ModelingIzar Tarandach — Command line threat modeling with pytmStephen de Vries — Threat Modeling with a bit of #StartupFOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~