Artwork

Content provided by Debra J. Farber (Shifting Privacy Left). All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debra J. Farber (Shifting Privacy Left) or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

S2E19: Privacy Threat Modeling - Mitigating Privacy Threats in Software with Kim Wuyts (KU Leuven)

45:05
 
Share
 

Manage episode 367186629 series 3407760
Content provided by Debra J. Farber (Shifting Privacy Left). All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debra J. Farber (Shifting Privacy Left) or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

This week's guest is Kim Wuyts, Senior Postdoctoral Researcher at the DistriNet Research Group at the Department of Computer Science at KU Leuven. Kim is one of the leading minds behind the development and extension of LINDDUN, a privacy threat modeling framework that mitigates privacy threats in software systems.
In this conversation, we discuss threat modeling based on the Threat Modeling Manifesto Kim co-authored; the benefits to using the LINDDUN privacy threat model framework; and how to bridge the gap between privacy-enhancing technologies (PETs) in academia and the commercial world.
Topics Covered:

  • Kim's career journey & why she moved into threat modeling.
  • The definition of 'threat modeling,' who should threat model, and what's included in her "Threat Modeling Manifesto."
  • The connection between threat modeling & a 'shift left' mindset / strategy.
  • Design patterns that benefit threat modeling & anti-patterns that inhibit.
  • Benefits to using the LINDDUN Privacy Threat Modeling framework for mitigating privacy threats in software, including the 7 'privacy threat types,' associated 'privacy threat trees,' and examples.
  • How "privacy threat trees' refine each threat type into concrete threat characteristics, examples, criteria & impact info.
  • Benefits & differences between LINDDUN GO and LINDDUN PRO.
  • How orgs can combine threat modeling approaches with PETs to address privacy risk.
  • Kim's work as Program Chair for the International Workshop on Privacy Engineering (IWPE), highlighting some anticipated talks.
  • The overlap of privacy & AI threats, and Kim's recommendation of The Privacy Library of Threats 4 AI ("PLOT4AI") Threat Modeling Card Deck
  • Recommended resources for privacy threat modeling, privacy engineering & PETs.
  • How the LINDDUN model & methodologies have been adopted by global orgs.
  • How to bridge the gap between the academic & commercial world to advance & deploy PETs.

Resources Mentioned:

Guest Info:

Send us a Text Message.

Privado.ai
Privacy assurance at the speed of product development. Get instant visibility w/ privacy code scans.
Shifting Privacy Left Media
Where privacy engineers gather, share, & learn
Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
Copyright © 2022 - 2024 Principled LLC. All rights reserved.

  continue reading

Chapters

1. S2E19: Privacy Threat Modeling - Mitigating Privacy Threats in Software with Kim Wuyts (KU Leuven) (00:00:00)

2. Introducing Kim Wuyts, Sr. Postdoctoral Researcher at the IMEC-DistriNet Research Group at the Department of Computer Science at KU Leuven. (00:01:15)

3. Kim describes her career journey and how she became interested in threat modeling. (00:02:28)

4. Kim defines 'threat modeling,' explains who should threat model, and discusses her co-authored 'Threat Modeling Manifesto.' (00:04:28)

5. Kim describes the connection between threat modeling and a 'shift left' mindset / strategy. (00:06:36)

6. Kim describes basic design patterns that benefit threat modeling and anti-patterns that inhibit threat modeling. (00:09:20)

7. Kim explains the benefits to using the (free) LINDDUN Privacy Threat Modeling Framework for mitigating privacy threats in software. She also describes the 7 'privacy threat types,' 'privacy threat trees,' and some examples. (00:13:13)

8. Kim describes "privacy threat trees' and how they help you refine each threat type into more concrete threat characteristics. (00:20:47)

9. Kim uses privacy threat type of "linking" to illustrate concrete threat characteristics, examples, criteria, and impact info would be included in a 'privacy threat tree." (00:23:38)

10. Kim explains the benefits and differences between LINDDUN's methodologies: LINDDUN GO & LINDDUN PRO. (00:26:23)

11. We discuss how orgs can combine threat modeling approaches with privacy enhancing technologies to address privacy risks; and Kim recommends multiple resources. (00:30:50)

12. Kim describes her work as Program Chair for the International Workshop on Privacy Engineering (IWPE) Conference and highlights some anticipated talks. (00:33:09)

13. Kim discusses the topic of privacy & AI and refers listeners to the Privacy Library of Threats 4 AI ("PLOT4AI") Threat Modeling Card Deck (00:35:49)

14. Kim lists her favorite resources for privacy threat modeling, privacy engineering, and PETs. (00:36:36)

15. Kim talks about how the LINDDUN model and methodologies have been adopted by organizations over the past few years. (00:38:45)

16. Kim shares how can we better bridge the gap between the academic and commercial world when it comes to advancing and deploying PETs. (00:40:35)

63 episodes

Artwork
iconShare
 
Manage episode 367186629 series 3407760
Content provided by Debra J. Farber (Shifting Privacy Left). All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debra J. Farber (Shifting Privacy Left) or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

This week's guest is Kim Wuyts, Senior Postdoctoral Researcher at the DistriNet Research Group at the Department of Computer Science at KU Leuven. Kim is one of the leading minds behind the development and extension of LINDDUN, a privacy threat modeling framework that mitigates privacy threats in software systems.
In this conversation, we discuss threat modeling based on the Threat Modeling Manifesto Kim co-authored; the benefits to using the LINDDUN privacy threat model framework; and how to bridge the gap between privacy-enhancing technologies (PETs) in academia and the commercial world.
Topics Covered:

  • Kim's career journey & why she moved into threat modeling.
  • The definition of 'threat modeling,' who should threat model, and what's included in her "Threat Modeling Manifesto."
  • The connection between threat modeling & a 'shift left' mindset / strategy.
  • Design patterns that benefit threat modeling & anti-patterns that inhibit.
  • Benefits to using the LINDDUN Privacy Threat Modeling framework for mitigating privacy threats in software, including the 7 'privacy threat types,' associated 'privacy threat trees,' and examples.
  • How "privacy threat trees' refine each threat type into concrete threat characteristics, examples, criteria & impact info.
  • Benefits & differences between LINDDUN GO and LINDDUN PRO.
  • How orgs can combine threat modeling approaches with PETs to address privacy risk.
  • Kim's work as Program Chair for the International Workshop on Privacy Engineering (IWPE), highlighting some anticipated talks.
  • The overlap of privacy & AI threats, and Kim's recommendation of The Privacy Library of Threats 4 AI ("PLOT4AI") Threat Modeling Card Deck
  • Recommended resources for privacy threat modeling, privacy engineering & PETs.
  • How the LINDDUN model & methodologies have been adopted by global orgs.
  • How to bridge the gap between the academic & commercial world to advance & deploy PETs.

Resources Mentioned:

Guest Info:

Send us a Text Message.

Privado.ai
Privacy assurance at the speed of product development. Get instant visibility w/ privacy code scans.
Shifting Privacy Left Media
Where privacy engineers gather, share, & learn
Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
Copyright © 2022 - 2024 Principled LLC. All rights reserved.

  continue reading

Chapters

1. S2E19: Privacy Threat Modeling - Mitigating Privacy Threats in Software with Kim Wuyts (KU Leuven) (00:00:00)

2. Introducing Kim Wuyts, Sr. Postdoctoral Researcher at the IMEC-DistriNet Research Group at the Department of Computer Science at KU Leuven. (00:01:15)

3. Kim describes her career journey and how she became interested in threat modeling. (00:02:28)

4. Kim defines 'threat modeling,' explains who should threat model, and discusses her co-authored 'Threat Modeling Manifesto.' (00:04:28)

5. Kim describes the connection between threat modeling and a 'shift left' mindset / strategy. (00:06:36)

6. Kim describes basic design patterns that benefit threat modeling and anti-patterns that inhibit threat modeling. (00:09:20)

7. Kim explains the benefits to using the (free) LINDDUN Privacy Threat Modeling Framework for mitigating privacy threats in software. She also describes the 7 'privacy threat types,' 'privacy threat trees,' and some examples. (00:13:13)

8. Kim describes "privacy threat trees' and how they help you refine each threat type into more concrete threat characteristics. (00:20:47)

9. Kim uses privacy threat type of "linking" to illustrate concrete threat characteristics, examples, criteria, and impact info would be included in a 'privacy threat tree." (00:23:38)

10. Kim explains the benefits and differences between LINDDUN's methodologies: LINDDUN GO & LINDDUN PRO. (00:26:23)

11. We discuss how orgs can combine threat modeling approaches with privacy enhancing technologies to address privacy risks; and Kim recommends multiple resources. (00:30:50)

12. Kim describes her work as Program Chair for the International Workshop on Privacy Engineering (IWPE) Conference and highlights some anticipated talks. (00:33:09)

13. Kim discusses the topic of privacy & AI and refers listeners to the Privacy Library of Threats 4 AI ("PLOT4AI") Threat Modeling Card Deck (00:35:49)

14. Kim lists her favorite resources for privacy threat modeling, privacy engineering, and PETs. (00:36:36)

15. Kim talks about how the LINDDUN model and methodologies have been adopted by organizations over the past few years. (00:38:45)

16. Kim shares how can we better bridge the gap between the academic and commercial world when it comes to advancing and deploying PETs. (00:40:35)

63 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide