Go offline with the Player FM app!
Jason Nelson -- Three Pillars of Threat Modeling Success: Consistency, Repeatability, and Efficacy
Manage episode 403416723 series 2408745
Jason Nelson, an accomplished expert in information security management, joins Chris to share insights on establishing successful threat modeling programs in data-intensive industries like finance and healthcare. Jason presents his three main pillars to consider when establishing a threat modeling program: consistency, repeatability, and efficacy. The discussion also provides a series of fascinating insights into security practices, regulatory environments, and the value of a threat modeling champion. As a threat modeling practitioner, Jason provides an essential perspective to anyone serious about application security.
FOLLOW OUR SOCIAL MEDIA:
➜Twitter: @AppSecPodcast
➜LinkedIn: The Application Security Podcast
➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast
Thanks for Listening!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Chapters
1. Introduction (00:00:00)
2. Security Origin Story (00:02:13)
3. Threat Modeling the Cloud (00:07:48)
4. Threat Modeling Pillar One: Consistency (00:16:44)
5. A Threat Modeling Champion (00:27:30)
6. Threat Modeling Pillar Two: Repeatability (00:33:35)
7. Threat Modeling Pillar Three: Efficacy (00:39:07)
8. Lightning Round (00:48:09)
290 episodes
Manage episode 403416723 series 2408745
Jason Nelson, an accomplished expert in information security management, joins Chris to share insights on establishing successful threat modeling programs in data-intensive industries like finance and healthcare. Jason presents his three main pillars to consider when establishing a threat modeling program: consistency, repeatability, and efficacy. The discussion also provides a series of fascinating insights into security practices, regulatory environments, and the value of a threat modeling champion. As a threat modeling practitioner, Jason provides an essential perspective to anyone serious about application security.
FOLLOW OUR SOCIAL MEDIA:
➜Twitter: @AppSecPodcast
➜LinkedIn: The Application Security Podcast
➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast
Thanks for Listening!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Chapters
1. Introduction (00:00:00)
2. Security Origin Story (00:02:13)
3. Threat Modeling the Cloud (00:07:48)
4. Threat Modeling Pillar One: Consistency (00:16:44)
5. A Threat Modeling Champion (00:27:30)
6. Threat Modeling Pillar Two: Repeatability (00:33:35)
7. Threat Modeling Pillar Three: Efficacy (00:39:07)
8. Lightning Round (00:48:09)
290 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.