What is Rapid Threat Model Prototyping?

What is Rapid Threat Model Prototyping?

Update: 2024-07-09
Share

Description

Summary:

In this episode, we sit down with Geoff Hill from Tutamantic_Sec to explore the innovative approach of Rapid Threat Model Prototyping (RTMP). Geoff shares his journey from being a C++ developer to becoming a threat modeling expert, highlighting the challenges and successes he encountered along the way. This episode dives deep into how RTMP can help streamline threat modeling processes, making them more efficient and scalable.

Key Discussion Points:

  1. Introduction to RTMP:

    • Geoff explains the origins and the need for a new threat modeling approach.

    • Discussion on traditional threat modeling challenges and how RTMP addresses them.

  2. Implementation and Benefits:

    • Detailed walkthrough of RTMP’s implementation in various organizations.

    • How RTMP integrates with existing development workflows like Agile and DevOps.

    • Benefits of using RTMP, including reduced workload on security teams and improved security posture.

  3. RTMP Methodology:

    • Explanation of the stages and numerical ranking system in RTMP.

    • How RTMP utilizes open-source frameworks and tools.

    • The role of security champions within development teams.

  4. Practical Applications and Case Studies:

    • Real-world examples of RTMP in action.

    • Success stories and lessons learned from implementing RTMP in different industries.

  5. Future of Threat Modeling:

    • Geoff’s insights on the evolution of threat modeling.

    • Upcoming trends and the importance of being proactive in security.

Resources Mentioned:

Connect with Geoff Hill:

  • Twitter: @Tutamantic_Sec

  • LinkedIn: Geoff Hill

Contact Information:

Leave a comment below or reach out via the contact form on the site, email [timothy.deblock[@]exploresec[.]com, or reach out on LinkedIn.

Check out our services page and reach out if you see any services that fit your needs.

Social Media Links:

[RSS Feed] [iTunes] [LinkedIn]






























































<form method="POST" novalidate data-form-id="66808af175cca81ba1b546d3" autocomplete="on" onsubmit="return (function (form) {
Y.use('squarespace-form-submit', 'node', function usingFormSubmit(Y) {
(new Y.Squarespace.FormSubmit(form)).submit({
formId: '66808af175cca81ba1b546d3',
collectionId: '55c01592e4b0b281efaaeac9',
objectName: 'item-66808af175cca81ba1b546d5'
});
});
return false;
})(this);" class="newsletter-form">

Subscribe


Sign up with your email address to receive news and updates.









<label for="email-yui_3_17_2_1_1704234756218_68248-field" class="newsletter-form-field-label title">Email Address</label>
<input autocomplete="email" spellcheck="false" name="email" id="email-yui_3_17_2_1_1704234756218_68248-field" placeholder="Email Address" type="email" class="newsletter-form-field-element field-element" x-autocompletetype="email" />







<button
class="
newsletter-form-button
sqs-system-button
sqs-editable-button-layout
sqs-editable-button-style
sqs-editable-button-shape
sqs-button-element--primary
"
type="submit"
value="Sign Up"
>

Sign Up

</button>







We respect your privacy.


Thank you!

</form>





Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

What is Rapid Threat Model Prototyping?

What is Rapid Threat Model Prototyping?

Timothy De Block