Hi
It started several years ago when I received an E-Mail from Axel: “Here’s some influencial Security books.” - “Threat Modeling - Designing for Security”? Sounds interesting! Bought. Read. Immediatelly thought: That’s so awesome! We must use this!
Meanwhile there were external consultants who brought us some STRIDE, Excel template and a {LOW, MEDIUM, HIGH, CRITICAL}² arbitrary risk rating scheme with all-critical bias.
We launched several Threat Modeling activities…
What I learned quickly is that people need actionable advice what to do, so I crafted our version 1 Threat Modeling process. This helped promote our Threat Modeling.
I got a second degree - Master IT Security. My master thesis was about “Usable and Secure End-To-End Encrypted Medical Image Link Shares”. I was especially happy that I could create and publish my Threat Model that I had done as part of the thesis. It was version 8. I had experimented quite a lot with different ways how to denote Threat Models. I ended up building my own solution with interconnected items, which later became the Threat Items Threat Modeling Template.
A few years later we decided to elevate our Threat Modeling efforts to the next level and craft our version 2 process. We wanted to cure certain issues that had gone wrong in the past - and improve.
When we designed our process, we asked ourselves “When we threat model… What can go wrong? What are we going to do about it?”. (Hey, isn’t that Threat Modeling?! )
I thought that this was a fun and insightful thing to share with the Community, so I translated, generalized and extended the project and published the () Threat Modeling of Threat Modeling #meta. I was interviewed about the project at the Application Security Podcast. And got to share the approach in a Meta Threat Modeling Threat Modeling Connect Community Meetup.
Now I’m working on a training lecture series “Security Ikea” that helps build developers’ Threat Modeling repertoire. I’m watching out for more opportunities to share the magic of Meta Threat Modeling and collect varied viewpoints.
I offer Threat Modeling training for vendors who want to start out.
And I always have an exciting private backlog with Threat Modeling projects… I publish at threat-modeling.net and here’s my Security bio.
Happy to connect!
Hendrik