DiscoverSoftware Engineering Institute (SEI) Podcast SeriesThreat Modeling: Protecting Our Nation’s Complex Software-Intensive Systems
Threat Modeling: Protecting Our Nation’s Complex Software-Intensive Systems

Threat Modeling: Protecting Our Nation’s Complex Software-Intensive Systems

Update: 2025-09-05
Share

Description

In response to Executive Order (EO) 14028, Improving the Nation’s Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Alex Vesey, both engineers with the SEI’s CERT Division, sit down with Timothy Chick, technical manager of CERT’s Applied Systems Group, to discuss how threat modeling can be used to protect software-intensive systems from attack. Specifically, they explore how threat models can guide system requirements, system design, and operational choices to identify and mitigate threats.  

Comments 
In Channel
Deploying on the Edge

Deploying on the Edge

2025-05-2801:01:02

loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Threat Modeling: Protecting Our Nation’s Complex Software-Intensive Systems

Threat Modeling: Protecting Our Nation’s Complex Software-Intensive Systems

Alex Vesey, Natasha Shevchenko, Tim Chick