Send us a text
The topic of today is threat modeling, a practice of identifying and prioritizing potential threats and security mitigations.Our guests are Anne Oikarinen from Nixu, and Nicolaj Græsholt from Eficode. Be sure to check out their profiles on Twitter and LinkedIn:- https://twitter.com/Anne_Oikarinen- https://www.linkedin.com/in/anne-oikarinen- https://twitter.com/figaw- https://www.linkedin.com/in/nicolajgraesholtRelated links:Webinar with Bankdata: Compliance and security in the DevOps worldhttps://hubs.li/H0NlrYx0Books to read:Threat Modeling: Designing for Security, by Adam Shostack, Wiley: https://threatmodelingbook.com/ Threat Modeling Manifesto: https://www.threatmodelingmanifesto.org/ Evil user stories: https://www.nixu.com/fi/node/1639Cyber Bogies card deck: https://github.com/nixu-corp/NixuCyberBogiesExplanatory blog for the cards: https://www.nixu.com/fi/blog/gamify-your-threat-modeling-nixu-cyber-bogiesBlogs:1. Mitigate against tampering attacks - Secure your software delivery chain: https://hubs.li/H0NlsPR02. Privacy by design: where security meets usability: https://hubs.li/H0NlsTN0