Best resources for becoming an expert Threat Modeller?

Original post by @wgildersleeve

So I know the usual suspects, of course: @AdamShostack’s books, various YouTube, the Threat Modelling Manifesto, and this forum…

But let’s say I want to become an “expert” in Threat Modelling… what can you recommend? Something on LinkedIn Learning, perhaps? Or by O’Reilly?

Or is it simply a matter of getting up-to-speed on the primary literature and hands-on learning?

What’s that joke about how do you get to the Carnegie Hall?

After you go over all the sources - threat model, threat model, threat model some more.

2 Likes

Crowd-sourcing is always a good mean to leverage common wisdom, therefore recommending this as a central resource: hysnsec/awesome-threat-modelling: A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review. (github.com)

Other than that -practice, practice, practice, …

1 Like

Original post by @Ajay

Practice, practice, practice! Yes getting hands-on as well as reading the primary literature are the go to activities when it comes to becoming a seasoned Threat modelling professional. Also to add to the mix, collaborate amongst your peers either at work or at topical events as this will invariably provide you with valuable insight into the complexities of this and surrounding areas of Threat modelling.

I have the same opinion. Practice, Practice and keep Practicing. I suggest you look to others in your community (local security chapters like OWASP, etc) and ask what they are doing and how they go about it. The key is to network, learn from others and just keep threat modeling.

1 Like

Original post by @lsaiz

Historical:

https://csrc.nist.gov/files/pubs/conference/1991/10/01/proceedings-14th-national-computer-security-confer/final/docs/1991-14th-ncsc-proceedings-vol-2.pdf (pages 572-581)

Related Practices:

Other not specific TM resources:

I have two things I can think of that have helped me:

The first trick is to leverage new knowledge or skills that are outside my day to day expertise, and bring them into my threat modeling. This really helps when you are mostly flying solo, or don’t have access to a larger group of people.

For example, say you learn something new about Kubernetes, maybe a new exploit is explained in a talk you saw, or a blog, or wherever, I set a goal to try to use that new thing in a threat model.

It kind of makes a fun game of potential ideas you collect that you need to learn and understand well enough before you get to drop it into a threat model.

The second trick is to get really good at listening to people and understanding their skills and approaches. If you are lucky enough to get a few engineers to help you threat model, listen carefully to how they are describing their view of how the system works. Pay attention to where there are uncertainties, second guessing, or even disagreements on functionality. Then start asking questions!