
[RERELEASE] What is threat modeling?
0:00
22:56
Wolfgang has presented at many conference on the topic of threat modeling. He suggests using a much similar method of threat modeling that involves threat paths, instead of other methods such as a threat tree or kill chain. You can find him taking long walks and naps on Twitter (@jwgoerlich) and participating in several MiSec projects and events. In this interview Wolfgang covers: what threat modeling is; what needs to be done to get started; who should perform it; resources; and the lifecycle of a threat model.
More episodes from "Exploring Information Security - Exploring Information Security"



Don't miss an episode of “Exploring Information Security - Exploring Information Security” and subscribe to it in the GetPodcast app.








