Gehen Sie mit der App Player FM offline!
Jason Nelson -- Three Pillars of Threat Modeling Success: Consistency, Repeatability, and Efficacy
Manage episode 403416723 series 2408745
Jason Nelson, an accomplished expert in information security management, joins Chris to share insights on establishing successful threat modeling programs in data-intensive industries like finance and healthcare. Jason presents his three main pillars to consider when establishing a threat modeling program: consistency, repeatability, and efficacy. The discussion also provides a series of fascinating insights into security practices, regulatory environments, and the value of a threat modeling champion. As a threat modeling practitioner, Jason provides an essential perspective to anyone serious about application security.
FOLLOW OUR SOCIAL MEDIA:
➜Twitter: @AppSecPodcast
➜LinkedIn: The Application Security Podcast
➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast
Thanks for Listening!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Kapitel
1. Introduction (00:00:00)
2. Security Origin Story (00:02:13)
3. Threat Modeling the Cloud (00:07:48)
4. Threat Modeling Pillar One: Consistency (00:16:44)
5. A Threat Modeling Champion (00:27:30)
6. Threat Modeling Pillar Two: Repeatability (00:33:35)
7. Threat Modeling Pillar Three: Efficacy (00:39:07)
8. Lightning Round (00:48:09)
289 Episoden
Manage episode 403416723 series 2408745
Jason Nelson, an accomplished expert in information security management, joins Chris to share insights on establishing successful threat modeling programs in data-intensive industries like finance and healthcare. Jason presents his three main pillars to consider when establishing a threat modeling program: consistency, repeatability, and efficacy. The discussion also provides a series of fascinating insights into security practices, regulatory environments, and the value of a threat modeling champion. As a threat modeling practitioner, Jason provides an essential perspective to anyone serious about application security.
FOLLOW OUR SOCIAL MEDIA:
➜Twitter: @AppSecPodcast
➜LinkedIn: The Application Security Podcast
➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast
Thanks for Listening!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Kapitel
1. Introduction (00:00:00)
2. Security Origin Story (00:02:13)
3. Threat Modeling the Cloud (00:07:48)
4. Threat Modeling Pillar One: Consistency (00:16:44)
5. A Threat Modeling Champion (00:27:30)
6. Threat Modeling Pillar Two: Repeatability (00:33:35)
7. Threat Modeling Pillar Three: Efficacy (00:39:07)
8. Lightning Round (00:48:09)
289 Episoden
כל הפרקים
×Willkommen auf Player FM!
Player FM scannt gerade das Web nach Podcasts mit hoher Qualität, die du genießen kannst. Es ist die beste Podcast-App und funktioniert auf Android, iPhone und im Web. Melde dich an, um Abos geräteübergreifend zu synchronisieren.