Hi 
It started several years ago when I received an E-Mail from Axel: âHereâs some influencial Security books.â - âThreat Modeling - Designing for Securityâ? Sounds interesting! Bought. Read. Immediatelly thought: Thatâs so awesome!
We must use this! 
Meanwhile there were external consultants who brought us some STRIDE, Excel template and a {LOW, MEDIUM, HIGH, CRITICAL}ÂČ arbitrary risk rating scheme with all-critical bias. 
We launched several Threat Modeling activitiesâŠ
What I learned quickly is that people need actionable advice what to do, so I crafted our version 1 Threat Modeling process. This helped promote our Threat Modeling. 
I got a second degree - Master IT Security. My master thesis was about âUsable and Secure End-To-End Encrypted Medical Image Link Sharesâ. I was especially happy that I could create and publish my Threat Model that I had done as part of the thesis. It was version 8. I had experimented quite a lot with different ways how to denote Threat Models. I ended up building my own solution with interconnected items, which later became the Threat Items Threat Modeling Template.
A few years later we decided to elevate our Threat Modeling efforts to the next level and craft our version 2 process. We wanted to cure certain issues that had gone wrong in the past - and improve.
When we designed our process, we asked ourselves âWhen we threat model⊠What can go wrong? What are we going to do about it?â. (Hey, isnât that Threat Modeling?!
)
I thought that this was a fun and insightful thing to share with the Community, so I translated, generalized and extended the project and published the 
(
) Threat Modeling of Threat Modeling #meta. I was interviewed about the project at the Application Security Podcast. And got to share the approach in a Meta Threat Modeling Threat Modeling Connect Community Meetup. 
Now Iâm working on a training lecture series âSecurity Ikeaâ that helps build developersâ Threat Modeling repertoire. Iâm watching out for more opportunities to share the magic of Meta Threat Modeling
and collect varied viewpoints.
I offer Threat Modeling training for vendors who want to start out.
And I always have an exciting private backlog with Threat Modeling projectsâŠ
I publish at threat-modeling.net and hereâs my Security bio.
Happy to connect!
Hendrik