Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/f2/0c/d0/f20cd044-b08f-345f-1d5d-4098f43fb44a/mza_17131539201400804761.png/600x600bb.jpg
Threat Modeling Unleashed
Security Compass
87 episodes
3 weeks ago
Security Compass, a leading provider of cybersecurity solutions and advisory services, enables organizations to adopt balanced development automation for rapid and secure application development. With their flagship product, SD Elements, the company helps automate significant portions of proactive manual processes for security and compliance that improves time to market for new technology. In addition, they offer advisory services on how organizations can embrace emerging technologies like cloud to strengthen their security posture. Security Compass is the trusted solution provider to leading financial organizations, technology enablers, and renowned global brands.
Show more...
Education
RSS
All content for Threat Modeling Unleashed is the property of Security Compass and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Security Compass, a leading provider of cybersecurity solutions and advisory services, enables organizations to adopt balanced development automation for rapid and secure application development. With their flagship product, SD Elements, the company helps automate significant portions of proactive manual processes for security and compliance that improves time to market for new technology. In addition, they offer advisory services on how organizations can embrace emerging technologies like cloud to strengthen their security posture. Security Compass is the trusted solution provider to leading financial organizations, technology enablers, and renowned global brands.
Show more...
Education
Episodes (20/87)
Threat Modeling Unleashed
Part 2: From Whiteboards to AI - The Evolution of Threat Modeling
Threat modeling has evolved from sketches on a whiteboard to AI-enabled, diagram-first platforms. This episode explores how teams can modernize without the complexity of bloated enterprise tools. Takeaways: Why manual and siloed approaches fail at scale. The rise of diagram-driven threat modeling. Where AI fits today — and what’s hype vs. real. Reinforces Devici’s value as simple, intuitive, and forward-looking.
Show more...
4 weeks ago
17 minutes

Threat Modeling Unleashed
Part 1: Getting Started with Threat Modeling — Simplifying the Start
Threat modeling can feel overwhelming, but it doesn’t have to be. Chris and Bruce break down who needs to be involved, what roles matter most, and how to start small without losing impact. Takeaways: Key players to engage: architects, AppSec leads, developers, exec sponsors. How to secure buy-in and avoid resistance. Practical first steps to launch a repeatable practice. Aligns with Devici’s “Security by Design starts somewhere — start fast” message.
Show more...
1 month ago
24 minutes

Threat Modeling Unleashed
Shaun Mckeag - Behind Application Security
Today we are joined by Altaz Valani from Security Compass and Shaun Mckeag, Principal Software Engineer at Gen Digital, to talk about her personal journey in software development and security. Many listeners are either trying to get into secure software development, or have graduated from a program that teaches security and software development, or perhaps recently transitioned from a different role. It’s nice to have someone with years of experience in the field to give some perspective, guidance, tips, and encouragement. Listen in as Shaun shares her personal journey that will  inspire and help those of us who are newer to the secure software space.   Useful links from this podcast: https://www.linkedin.com/in/shaunmckeag/ https://nakedsecurity.sophos.com/podcast/ https://www.sans.org/blog/ https://www.devseccon.com/the-secure-developer-podcast https://darknetdiaries.com/ https://owasp.org/events/#AppSec%20Days https://devcon.org/ https://www.blackhat.com/  
Show more...
2 years ago
23 minutes

Threat Modeling Unleashed
Pranshu Bajpai - Use Training to Influence Your Developers With Embracing Security
Today we are joined by Altaz Valani from Security Compass and Pranshu Bajpai, Security Architect at Motorola Solutions, to talk about the use of application security training to influence developers toward embracing security. Many developers are eager to learn about security but they need help. Developers move very fast because their performance is often measured around release frequency. All of this is happening while developers have to keep up with continually evolving frameworks and tools. It is possible for security teams to influence developers without getting in their way.
Show more...
2 years ago
26 minutes

Threat Modeling Unleashed
Simone Curzi - Developer Centric Threat Modeling
Today we are joined by Altaz Valani from Security Compass and Simone Curzi, Principal Consultant at Microsoft, to talk about the role of developers within threat modeling. When we mention threat modeling, what often comes to mind are data flow diagrams created during a security design process. After these diagrams are created and eventually hit the developer backlog, we discover more insights that further evolve the security design. In this way, developers are crucial to an evolving threat model activity. Yet, many questions exist. We try to answer some of those developer questions related to threat modeling. Useful links from this podcast: https://simoneonsecurity.com/ https://threatsmanager.com/  https://www.threatmodelingmanifesto.org/  https://cve.mitre.org/ https://cwe.mitre.org/
Show more...
3 years ago
30 minutes

Threat Modeling Unleashed
Jason Keirstead - Standardizing on Security Tool Integrations
Today we are joined by Altaz Valani from Security Compass and Jason Keirstead, Distinguished Engineer & Chief Technical Officer of Threat Management at IBM as well as Co-Chair of Open Cybersecurity Alliance. Security tool integrations are largely custom efforts today. That investment alone prevents loose coupling of our security tool architectures and timely delivery of security insights to key decision makers. Jason shares his insights on the work going on at Open Cybersecurity Alliance (OCA) to help solve this problem. The holy grail of an integrated security fabric that shares information across a toolchain can transform our ability to rapidly adapt to a changing threat landscape and allow for early detection of threat actor behavior. Jason shares his vision of how everyone can play a part in making this a reality, from customer procurement to vendor adoption of security standards.
Show more...
3 years ago
28 minutes

Threat Modeling Unleashed
Vaibhav Garg - Developer Centric Threat Modeling
Today we are joined by Vaibhav Garg, Executive Director, Cybersecurity & Privacy Research and Public Policy at Comcast, to talk about developer-centric threat modeling. We start by looking at ways to make threat modeling more appealing to developers. We discuss how a security team can help developers participate in threat modeling in the midst of continual change with both development and security teams. Ultimately, a threat modeling program is only as effective as the value it offers to a diverse group of stakeholders. We discuss how to measure and align the value of threat modeling across project, program, and executive levels. We conclude with Vaibhav’s thoughts about where he thinks developer-centric threat modeling is heading over the next 12 to 18 months.
Show more...
3 years ago
22 minutes

Threat Modeling Unleashed
Krish Raja - Bringing Developers Into Your Threat Modeling Program
Today we are joined by Altaz Valani from Security Compass and Krish Raja, Managing Director at Kroll Cyber Risk division, to talk about developer-centric threat modeling. We will start by discussing how threat modelers can help developers. We then discuss how to define the value of a threat modeling program and common pitfalls when creating such a program. We close off by discussing where threat modeling is headed in the future.
Show more...
3 years ago
15 minutes

Threat Modeling Unleashed
Simone Curzi - The Challenge of Integrating Threat Modeling into DevOps
Today we are joined by Simone Curzi, Principal Consultant at Microsoft, to talk about some of the challenges we face today with conducting threat modeling. We will discuss how value creation in threat modeling is tied to the developer community and, ultimately, to the business. Our discussion will then look at how threat modeling must continue to evolve in light of our DevOps delivery cycles. We will conclude with a brief discussion on how organizations can operationalize a threat modeling practice.
Show more...
3 years ago
16 minutes

Threat Modeling Unleashed
Spencer Koch - The Importance of a Good Threat Modeling Practice
Today we are joined by Spencer Koch, Offensive Security Professional at Reddit, to talk about building a threat modeling practice. We will examine when threat modeling should be done and the associated challenges. We will then turn our attention to the connection between threat modeling and secure coding in the developer space. In conclusion, we will explore some measures of success and where threat modeling is headed as the practice continues to add value and adapt to a changing software development paradigm that is more agile and cross-functional.
Show more...
3 years ago
13 minutes

Threat Modeling Unleashed
Kyle Lai - Managing the Change From CMMC 1.0 to CMMC 2.0
Today we are once again joined by Kyle Lai, Founder and CISO of KLC Consulting, to talk about CMMC. We will start by discussing the differences between CMMC 1.0 and CMMC 2.0 and discuss the timeline for CMMC 2.0 rulemaking. Our discussion will also look at CMMC 2.0 both from an assessor’s perspective and a Defense contractor’s perspective. Specifically, how an assessor should manage the change if they are already invested in CMMC 1.0 and next steps for a Defense contractor to do before CMMC 2.0 rulemaking is complete. CMMC impacts a broad ecosystem and being aware of the changes can help organizations prepare for the transition.
Show more...
3 years ago
16 minutes

Threat Modeling Unleashed
Kim Wuyts - Privacy Threat Modeling with LINDDUN
Today we are joined by Kim Wuyts from KU Leuven, to talk about privacy threat modeling. We will start by discussing what LINDDUN is and the difference between privacy threat modeling and security threat modeling. We will then discuss how a framework like LINDDUN can be used in DevSecOps pipelines as part of an evolving knowledge base. For those who wish to provide feedback to the LINDDUN team, Kim will share some ways that you can reach out to her team. Privacy is a critical part of our software that is often neglected. With new regulations and standards emphasizing both privacy and security, we need a consistent approach to help guide policy creation and software development activities.  
Show more...
3 years ago
10 minutes

Threat Modeling Unleashed
Nick Deshpande - Data Governance
Today we are joined by Nick Deshpande to talk about data governance and security. We will start by introducing the concept of data governance and the business importance of data governance. We will dig deeper and discuss who is responsible for creating and managing a data governance program. When looking at data governance as an enabler, we will turn our attention to three use cases: DevSecOps, Threat Modeling, and Zero Trust. In concluding, Nick will share his thoughts on where he sees data governance evolving over the next 12-18 months.  
Show more...
3 years ago
17 minutes

Threat Modeling Unleashed
Kyle Lai - Complying With CMMC
Today we are joined by Kyle Lai, Founder and CISO of KLC Consulting, to talk about CMMC. We will start by discussing the governance and ownership aspects of CMMC. Once a CMMC program has kicked off, teams usually have to overcome some challenges. We will discuss the top challenges with achieving CMMC compliance. In an era of DevSecOps, we will turn our attention to the importance of automation and conclude by discussing the impact of CMMC in the near future.
Show more...
3 years ago
17 minutes

Threat Modeling Unleashed
K Royal - Think about User Privacy When Developing Your Software
Today we are joined by K Royal, Associate General Counsel & DPO of TrustArc, to talk about Software Development and Privacy. We will start by discussing what the intersection of privacy and software development looks like. We will examine the essential competencies required to produce privacy compliant software and touch on automated privacy checking in the context of DevSecOps pipelines. We will conclude by discussing where privacy is headed in the next 12-18 months. Producing privacy compliant software is becoming increasingly important in light of government regulations.
Show more...
3 years ago
22 minutes

Threat Modeling Unleashed
Mark Simos - Using Security Reference Architectures
Today we are joined by Mark Simos, Lead Cybersecurity Architect at Microsoft, to talk about leveraging security reference architectures to operationalize security. We will talk about our current context and the democratization of security and DevOps across the enterprise. Since security touches so many parts of the organization, this is where the role of security reference architectures becomes critical in creating an onramp for cross-functional teams. They help coordinate activities and programs against measurable business outcomes. We will conclude by looking forward to the next 18-24 months and what to expect.   #podcast #cybersecurity 
Show more...
3 years ago
7 minutes

Threat Modeling Unleashed
Michael Isbitski - Executive Overview on Securing Your APIs
Today we are joined by Michael Isbitski, Technical Evangelist at Salt Security, to talk about API Security. Our systems and platforms today are largely driven by API integrations. We will start by discussing ownership of API security in an organization. This will lead into a discussion about convincing a business stakeholder to invest in API security. Given how complex our applications are today, we will talk about some of the biggest challenges with securing our APIs. As security paradigms continue to evolve, we have gone from perimeter based security to Zero Trust. We will conclude by discussing how API security fits into Zero Trust.  
Show more...
3 years ago
19 minutes

Threat Modeling Unleashed
Carmichael Patton - Lessons from Zero Trust Implementations
Today we are joined by Carmichael Patton, Senior Security Architect at Microsoft, to talk about Zero Trust. We will talk about the value proposition along with ownership and accountability for a Zero Trust program. It is important that Zero Trust aligns with business priorities. We will also discuss the rollout of Zero Trust and some important lessons learned from previous implementations. 
Show more...
4 years ago
11 minutes

Threat Modeling Unleashed
Rob Akershoek - The Importance of a Security Reference Architecture
Today we are joined by Rob Akershoek from DXC, to talk about security reference architectures. We will start by discussing why we need a security reference architecture. This will lead us into governance and who is responsible for creating a security reference architecture. Since we don’t have a standard security reference architecture in the industry, we will explain how to start creating a security reference architecture. In conclusion, we will share some of the work being done by The Open Group around security reference architectures. 
Show more...
4 years ago
12 minutes

Threat Modeling Unleashed
Mark Timms - The Human Side of Cyber Security
Today we are joined by Mark Timms, Senior Manager, Cybersecurity Education & Awareness Behavioural Science at RBC, to talk about the human side of cyber security. We will talk about what motivates people to embrace a security program and what triggers drive the intended behavior. Building a security culture takes intentionality and a coordinated set of activities that focuses on the person. We will conclude with a consideration on how we should think about measuring the outcome. Cyber security is top of mind for many organizations and understanding the human side will help to drive meaningful programs that align with personal and organizational motivations.
Show more...
4 years ago
11 minutes

Threat Modeling Unleashed
Security Compass, a leading provider of cybersecurity solutions and advisory services, enables organizations to adopt balanced development automation for rapid and secure application development. With their flagship product, SD Elements, the company helps automate significant portions of proactive manual processes for security and compliance that improves time to market for new technology. In addition, they offer advisory services on how organizations can embrace emerging technologies like cloud to strengthen their security posture. Security Compass is the trusted solution provider to leading financial organizations, technology enablers, and renowned global brands.