The ITSM Practice: Elevating ITSM and IT Security Knowledge
Explore the critical aspects of threat modeling in this engaging episode of the ITSM Practice podcast with Luigi Ferri. Discover the significance of proactive security measures, the types of threats including Accidental, Tradeoff, and Inherent Threats, and how they're addressed through comprehensive strategies. Learn about the operations involved in Threat Modeling, its importance in today's cybersecurity landscape, and the collaborative effort required for effective implementation. Dive deep into the benefits, challenges, and detailed steps of threat modeling, underlining its pivotal role in securing digital infrastructures.
In this episode, we answer to:
Why is security Threat Modeling critically important?
What are the advantages of a Threat Model?
How does threat modeling become a collaborative effort?
Resources Mentioned in this Episode:
Adam Shostak, whitepaper "Inherent Threats", link https://www.linkedin.com/in/shostack/ or https://shostack.org/about/adam
Synopsys, article "Threat Modeling", link https://www.synopsys.com/glossary/what-is-threat-modeling.html#:~:text=Threat%20modeling%20is%20a%20structured,An%20abstraction%20of%20the%20system
OWASP, article "Threat Modeling Process", link https://owasp.org/www-community/Threat_Modeling_Process
Microsoft, article "Threat Modeling", link https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
Threat Modeling Manifesto, link https://www.threatmodelingmanifesto.org/
Connect with me on:
LinkedIn: https://www.linkedin.com/in/theitsmpractice/
Website: http://www.theitsmpractice.com
And if you want more tips and guidance, follow me on LinkedIn. I am sharing daily posts regarding Enterprise Service Management, IT Service Management, and IT Security.
Credits:
Sound engineering by Alan Southgate - http://alsouthgate.co.uk/
Graphics by Yulia Kolodyazhnaya