Security Monitoring and Threat Modelling

h/t to CloudSecList

Security Monitoring - Threat Modelling and Data Sources is a really interesting article that leverages threat modelling to help determine what are the most important data sources to track for security monitoring.

I personally think there is a huge untapped area of influence for threat modelling on how it can be leveraged by other areas of security. If anyone has some case studies or experience of such a cross-over I think the community would love to hear about it.