با برنامه Player FM !
Jason Nelson -- Three Pillars of Threat Modeling Success: Consistency, Repeatability, and Efficacy
Manage episode 403429125 series 2540720
Jason Nelson, an accomplished expert in information security management, joins Chris to share insights on establishing successful threat modeling programs in data-intensive industries like finance and healthcare. Jason presents his three main pillars to consider when establishing a threat modeling program: consistency, repeatability, and efficacy. The discussion also provides a series of fascinating insights into security practices, regulatory environments, and the value of a threat modeling champion. As a threat modeling practitioner, Jason provides an essential perspective to anyone serious about application security.
FOLLOW OUR SOCIAL MEDIA:
➜Twitter: @AppSecPodcast
➜LinkedIn: The Application Security Podcast
➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast
Thanks for Listening!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
فصل ها
1. Introduction (00:00:00)
2. Security Origin Story (00:02:13)
3. Threat Modeling the Cloud (00:07:48)
4. Threat Modeling Pillar One: Consistency (00:16:44)
5. A Threat Modeling Champion (00:27:30)
6. Threat Modeling Pillar Two: Repeatability (00:33:35)
7. Threat Modeling Pillar Three: Efficacy (00:39:07)
8. Lightning Round (00:48:09)
296 قسمت
Manage episode 403429125 series 2540720
Jason Nelson, an accomplished expert in information security management, joins Chris to share insights on establishing successful threat modeling programs in data-intensive industries like finance and healthcare. Jason presents his three main pillars to consider when establishing a threat modeling program: consistency, repeatability, and efficacy. The discussion also provides a series of fascinating insights into security practices, regulatory environments, and the value of a threat modeling champion. As a threat modeling practitioner, Jason provides an essential perspective to anyone serious about application security.
FOLLOW OUR SOCIAL MEDIA:
➜Twitter: @AppSecPodcast
➜LinkedIn: The Application Security Podcast
➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast
Thanks for Listening!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
فصل ها
1. Introduction (00:00:00)
2. Security Origin Story (00:02:13)
3. Threat Modeling the Cloud (00:07:48)
4. Threat Modeling Pillar One: Consistency (00:16:44)
5. A Threat Modeling Champion (00:27:30)
6. Threat Modeling Pillar Two: Repeatability (00:33:35)
7. Threat Modeling Pillar Three: Efficacy (00:39:07)
8. Lightning Round (00:48:09)
296 قسمت
Minden epizód
×به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.