Cloud Security Podcast

HOW TO Threat Model Digital Applications in Cloud

Aug 21, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
Develop Fast, Stay Secure
02:25 • 2min
3
What's Your Version of Tret Morling?
04:08 • 2min
4
Application Security - What's a Sass Toel Did I Get?
06:20 • 3min
5
Why Is Threat Mordling Important?
09:02 • 3min
6
Flow Analysis of Onap Service From Acrat Design or Diagram
11:34 • 3min
7
How to Reduce the Operational Work Load on Security Engineers
14:17 • 3min
8
I'm a Developer and I've Got a Lot of Experience in Threat Malling.
17:45 • 3min
9
The Goal of Threat Mauling Isn't to Eliminate All Risk
21:12 • 2min
10
How Do You Know When to Fix a Vulnerability?
23:29 • 3min
11
Cloud Services
26:09 • 3min
12
How Does the Complexity Increase in Cloud Security?
29:09 • 3min
13
Taking a Holiday in a Tretmoral Situation?
31:45 • 4min
14
The Minimum Representation in a Tread Modeling Session?
36:13 • 2min
15
How to Build a Security Team From Scratch
38:01 • 3min
16
Doing Security and Doing Threat Analysis?
41:24 • 3min
17
The Four Stages of the Threat Modeling Process
44:23 • 3min
18
How Do You Maintain Quality of Threat Models?
47:38 • 2min
19
Pre Cobid Security
50:02 • 3min
20
Is Stride a Tool to Discover Vulabilities?
53:17 • 2min
21
Fred Mordling - Is There a Free Threat Modeling Channel?
54:55 • 2min
22
I'll Take That as an Answer
56:53 • 3min