The Threat Modeling Podcast

Chris Romeo

Chris Romeo is going on a journey. A journey to understand threat modeling at the deepest levels. He thought he understood threat modeling but realized he could go deeper. Chris shares his findings and talks with some of the best-known experts in the space to experience continuous learning. Join along for the ride -- you will learn something.

Chris Romeo is the CEO of Devici (THE Threat Modeling Company) and a General Partner at Kerr Ventures.

read less
TechnologyTechnology

Episodes

Dr. Michael Loadenthal -- Intersectional, Harm Reduction Approach to Threat Modeling
Aug 24 2023
Dr. Michael Loadenthal -- Intersectional, Harm Reduction Approach to Threat Modeling
Dr. Michael Loadenthal specializes in threat modeling beyond the conventional realm of technology. Companies today face multifaceted challenges, including political, legal, and technical threats. Solutions to these problems can also be varied. A comprehensive threat model should consider many dimensions, such as political, legal, ethical, and social. Whether advising activist groups or high-profile individuals, Dr. Loadenthal emphasizes a comprehensive understanding of the threat landscape and the development of context-specific solutions.Dr. Loadenthal's unique approach to threat modeling is rooted in his early involvement in social movements and activism. He noticed that groups often faced many non-technical threats, such as legal, social, and political challenges. This realization led him to develop "intersectional threat modeling," which considers a broader spectrum of threats beyond just the technical.Based on his diverse training and experience, Dr. Loadenthal emphasizes the importance of a multidisciplinary approach. He collaborates with a diverse team of specialists, including advisors and the clients themselves, to address complex challenges. Threat modeling works best with a team, and he discusses ways this works for him.One of the tools in Dr. Loadenthal's multidisciplinary toolbox is the mind map. A mind map can show relationships between threats and lead to integrated solutions that address multiple problems together. A tool he likes to use from outside the tech industry is the harm reduction framework, a concept borrowed from public health. This approach acknowledges the inherent risks in various activities or systems but seeks to minimize the potential harm. Dr. Loadenthal explains how he applies the harm reduction framework to threat modeling. He shares practical examples of companies, non-profits, and high-profile individuals who all benefit from the broader perspective of his intersectional threat modeling.
Product-led threat modeling
Jun 7 2023
Product-led threat modeling
What is the connection between threat modeling and product development? How can you apply lean product management and focus on understanding the user's needs while still threat modeling? Prepare to explore product-led threat modeling.The conversation delves into the importance of taking responsibility for security and using the language of the teams being influenced. Michal shares his process for conducting a threat modeling session, including using rapid risk assessment and STRIDE methodologies, building a threat library, and utilizing cookbooks for different technological approaches.Throughout the episode, Chris and Michal provide valuable insights and best practices for incorporating threat modeling into product development, emphasizing the importance of collaboration and communication between product managers, architects, and technical leaders. Listeners will come away with a deeper understanding of how to approach threat modeling that aligns with the user's needs and the product's goals.Key takeaways:1. Threat modeling can be integrated into the product management approach to understand better the needs of the user and design mitigations for security risks2. The problem space and solution space are terms from lean product management that can be applied to threat modeling3. Responsibility for security should be taken by the product manager or owner4. Rapid risk assessment and STRIDE methodology can be used to identify and prioritize threats5. Cookbooks for different technological approaches can be used as references for solving security problems6. Smart threat modeling builders use the language of the teams they are trying to influence7. The product manager must be in the habit of saying it's my problem, not someone else's.
The Threat Modeling Podcast -- Coming Soon!
Apr 4 2023
The Threat Modeling Podcast -- Coming Soon!
On this podcast, we'll journey together into the world of threat modeling. On this journey, we'll learn the history of threat modeling, hear from influential folks, explore the available methodologies and tools, and have fun. My name is Chris Romeo, and I've been threat modeling my entire 25+ year career in security. In addition, I host other podcasts, including the Application Security Podcast and the Security Table. The AppSec Podcast is an interview format where my co-host Robert Hurlbut and I deconstruct world-class application security performers to find the tools, tactics, and tricks listeners can use. The Security Table is a round table with three of my friends, where we explore and discuss/debate various issues impacting the world of cybersecurity. This podcast is different. This podcast is my journey to understand a subject I know about. I aim to achieve a more profound understanding by breaking threat modeling down to its fundamental pieces and explaining them to you. They say the best way to understand a topic is to study and teach it, so here we go. After laying the foundation, we'll return to the starting point for threat modeling and understand the history. From there, I'll talk to various experts in the field to break down what they think threat modeling is and ask them to teach me something new that I need to learn about the topic. Please subscribe, continue to tune in as we go on this threat modeling journey together, and remember to threat model all the things.