
Wolfgang has presented at many conference on the topic of threat modeling. He suggests using a much similar method of threat modeling that involves threat paths, instead of other methods such as a threat tree or kill chain. You can find him taking long walks and naps on Twitter (@jwgoerlich) and participating in several MiSec projects and events. In this interview Wolfgang covers: what threat modeling is; what needs to be done to get started; who should perform it; resources; and the lifecycle of a threat model.
Podzilla Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.

[RERELEASE] What is the perception of information security - part 2

[RERELEASE] What is the perception of information security - part 1

Exploring the Quantum Horizon: Why We Need CBOMs Today

Exploring the Risks of Model Context Protocol (MCP) with Casey Bleeker
Free AI-powered recaps of Exploring Information Security - Timothy De Block and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.