The Security Table

12 Factors of Threat Modeling


Listen Later

Chris, Matt and Izar share their thoughts on an article published by Carnegie Mellon University’s Software Engineering Institute. The list from the article covers various threat modeling methodologies such as STRIDE, PASTA, LinDoN, and OCTAVE methodology for risk management. They emphasize the importance of critical thinking in the field, provide insights into strengths, applications, and limitations of each method, and highlight the significance of annotated threat models for application security.

 

Mentioned in this Episode:
Article: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/

Podcast episode: Nobody's Going to Mess with Our STRIDE https://www.youtube.com/watch?v=TDFRe_icFmY&pp=ygUSdGhlIHNlY3VyaXR5IHRhYmxl

FOLLOW OUR SOCIAL MEDIA:

➜Twitter: @SecTablePodcast
➜LinkedIn: The Security Table Podcast
➜YouTube: The Security Table YouTube Channel

Thanks for Listening!

...more
View all episodesView all episodes
Download on the App Store

The Security TableBy Izar Tarandach, Matt Coles, and Chris Romeo

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings


More shows like The Security Table

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,976 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

626 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,879 Listeners

Blueprint: Build the Best in Cyber Defense by SANS Institute

Blueprint: Build the Best in Cyber Defense

131 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners