
Sign up to save your podcasts
Or
Get ready for a paradigm shift in how you build software. In this episode of the Scale to Zero podcast with Adam Shostack, we crash-landed with a powerful concept called Secure by Design! It's not just a mantra for the Rebel Alliance, it's the key to building unbreachable software from the very first line of code.
05:44 What is the Secure by Design concept? And why is it crucial?
09:30 Difference between Secure by Design and Secure by Default
12:50 Key steps to integrate Secure by Design principles in SDLCs
18:45 Area of focus for integrating threat modeling in SDLCs
21:18 Validating the threat modeling design
25:50 Thin line between Star Wars and Secure by Design concept
31:00 Examples from Star Wars that resonate Secure by Design concept
33:20 Role of communication and collaboration in the Secure by Design concept across various teams
36:40 How to raise awareness about the importance of Secure by Design within workplaces
40:00 Concept of Cyber Public Health and its connection to threat modeling
44:29 Summary
45: 20 Rating Security Practices section
Get ready for a paradigm shift in how you build software. In this episode of the Scale to Zero podcast with Adam Shostack, we crash-landed with a powerful concept called Secure by Design! It's not just a mantra for the Rebel Alliance, it's the key to building unbreachable software from the very first line of code.
05:44 What is the Secure by Design concept? And why is it crucial?
09:30 Difference between Secure by Design and Secure by Default
12:50 Key steps to integrate Secure by Design principles in SDLCs
18:45 Area of focus for integrating threat modeling in SDLCs
21:18 Validating the threat modeling design
25:50 Thin line between Star Wars and Secure by Design concept
31:00 Examples from Star Wars that resonate Secure by Design concept
33:20 Role of communication and collaboration in the Secure by Design concept across various teams
36:40 How to raise awareness about the importance of Secure by Design within workplaces
40:00 Concept of Cyber Public Health and its connection to threat modeling
44:29 Summary
45: 20 Rating Security Practices section