Tech Lead Journal cover image

#138 - Building Application Security Program - Derek Fisher

Tech Lead Journal

CHAPTER

How to Prioritize Threat Modeling

It comes down to understanding what the risk level or risk tolerances of the organization. And we don't always do a good job of that, he says. "We're not great at being able to make that decision quickly and in a very calculated way"

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner