Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Introduction
00:00 • 2min
Develop Fast, Stay Secure
02:25 • 2min
What's Your Version of Tret Morling?
04:08 • 2min
Application Security - What's a Sass Toel Did I Get?
06:20 • 3min
Why Is Threat Mordling Important?
09:02 • 3min
Flow Analysis of Onap Service From Acrat Design or Diagram
11:34 • 3min
How to Reduce the Operational Work Load on Security Engineers
14:17 • 3min
I'm a Developer and I've Got a Lot of Experience in Threat Malling.
17:45 • 3min
The Goal of Threat Mauling Isn't to Eliminate All Risk
21:12 • 2min
How Do You Know When to Fix a Vulnerability?
23:29 • 3min
Cloud Services
26:09 • 3min
How Does the Complexity Increase in Cloud Security?
29:09 • 3min
Taking a Holiday in a Tretmoral Situation?
31:45 • 4min
The Minimum Representation in a Tread Modeling Session?
36:13 • 2min
How to Build a Security Team From Scratch
38:01 • 3min
Doing Security and Doing Threat Analysis?
41:24 • 3min
The Four Stages of the Threat Modeling Process
44:23 • 3min
How Do You Maintain Quality of Threat Models?
47:38 • 2min
Pre Cobid Security
50:02 • 3min
Is Stride a Tool to Discover Vulabilities?
53:17 • 2min
Fred Mordling - Is There a Free Threat Modeling Channel?
54:55 • 2min
I'll Take That as an Answer
56:53 • 3min