Decoded: The Cybersecurity Podcast

OWASP Application Threat Modeling by Edward Henriquez


Listen Later

This OWASP document details a structured approach to application threat modeling. It outlines a four-step process: scoping the work, identifying threats (using methods like STRIDE), determining countermeasures and mitigation strategies, and assessing the completed work. The process emphasizes understanding the application from an attacker's perspective to proactively address security risks. Examples and templates are provided to guide users through each step, resulting in a comprehensive threat model document for the application. The document also explains how threat modeling complements code reviews.

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

4 ratings


More shows like Decoded: The Cybersecurity Podcast

View all
Crime Junkie by Audiochuck

Crime Junkie

369,043 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

138 Listeners

CISSP Cyber Training Podcast - CISSP Training Program by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

CISSP Cyber Training Podcast - CISSP Training Program

32 Listeners