This is part two of the story of a diverse group of security and privacy people that love threat modeling and gathered to define threat modeling, encourage people to threat model, help them succeed, and change the world. This is our story of the Threat Modeling Manifesto. In this episode, we move on from definition to working through the values and principles that make up threat modeling, and then we ship the product.
The working group of the Threat Modeling Manifesto consists of individuals with years of experience in threat modeling for security or privacy.
Other episodes on threat modeling:
- The Threat Modeling Manifesto – Part 1
- Adam Shostack — Remote Threat Modeling
- Kim Wuyts — Privacy Threat Modeling
- Izar Tarandach — Command line threat modeling with pytm
- Stephen de Vries — Threat Modeling with a bit of #Startup
FOLLOW OUR SOCIAL MEDIA:
➜Twitter: @AppSecPodcast
➜LinkedIn: The Application Security Podcast
➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast
Thanks for Listening!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~