Exploring Information Security - Exploring Information Security

What is Rapid Threat Model Prototyping?


Listen Later

Summary:

In this episode, we sit down with Geoff Hill from Tutamantic_Sec to explore the innovative approach of Rapid Threat Model Prototyping (RTMP). Geoff shares his journey from being a C++ developer to becoming a threat modeling expert, highlighting the challenges and successes he encountered along the way. This episode dives deep into how RTMP can help streamline threat modeling processes, making them more efficient and scalable.

Key Discussion Points:

  1. Introduction to RTMP:

    • Geoff explains the origins and the need for a new threat modeling approach.

    • Discussion on traditional threat modeling challenges and how RTMP addresses them.

  2. Implementation and Benefits:

    • Detailed walkthrough of RTMP’s implementation in various organizations.

    • How RTMP integrates with existing development workflows like Agile and DevOps.

    • Benefits of using RTMP, including reduced workload on security teams and improved security posture.

  3. RTMP Methodology:

    • Explanation of the stages and numerical ranking system in RTMP.

    • How RTMP utilizes open-source frameworks and tools.

    • The role of security champions within development teams.

  4. Practical Applications and Case Studies:

    • Real-world examples of RTMP in action.

    • Success stories and lessons learned from implementing RTMP in different industries.

  5. Future of Threat Modeling:

    • Geoff’s insights on the evolution of threat modeling.

    • Upcoming trends and the importance of being proactive in security.

Resources Mentioned:

  • Tutamantic

  • GitHub Repository for RTMP

  • OWASP Top 10

Connect with Geoff Hill:

  • Twitter: @Tutamantic_Sec

  • LinkedIn: Geoff Hill

Contact Information:

Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.

Check out our services page and reach out if you see any services that fit your needs.

Social Media Links:

[RSS Feed] [iTunes] [LinkedIn]

Subscribe

Sign up with your email address to receive news and updates.

Email Address
Sign Up

We respect your privacy.

Thank you!


...more
View all episodesView all episodes
Download on the App Store

Exploring Information Security - Exploring Information SecurityBy Timothy De Block

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

43 ratings


More shows like Exploring Information Security - Exploring Information Security

View all
Security Now (Audio) by TWiT

Security Now (Audio)

2,002 Listeners

Risky Business by Patrick Gray

Risky Business

376 Listeners

Down the Security Rabbithole Podcast (DtSR) by Rafal (Wh1t3Rabbit) Los

Down the Security Rabbithole Podcast (DtSR)

98 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

652 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,022 Listeners

The Daily by The New York Times

The Daily

112,617 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,017 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

177 Listeners

Behind the Money by Financial Times

Behind the Money

227 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Hacker Valley Studio by Hacker Valley Media

Hacker Valley Studio

60 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

136 Listeners

Hard Fork by The New York Times

Hard Fork

5,469 Listeners

The President's Daily Brief by The First TV

The President's Daily Brief

3,359 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

46 Listeners