Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts116/v4/4b/06/ec/4b06ec64-18c6-bee9-b9bd-c139198b4d60/mza_12952958078077283119.jpg/600x600bb.jpg
Ask A CISO
Horangi Cyber Security
76 episodes
4 days ago
The Ask A CISO podcast is brought to you by Horangi Cyber Security, Asia's leader in cloud security. Every week, we chat with prominent CISOs and industry veterans from all over the world to get their insights into the most pressing cybersecurity issues today and tomorrow's challenges. For more information, visit Horangi at https://www.horangi.com.
Show more...
Technology
RSS
All content for Ask A CISO is the property of Horangi Cyber Security and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Ask A CISO podcast is brought to you by Horangi Cyber Security, Asia's leader in cloud security. Every week, we chat with prominent CISOs and industry veterans from all over the world to get their insights into the most pressing cybersecurity issues today and tomorrow's challenges. For more information, visit Horangi at https://www.horangi.com.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_episode400/18328942/18328942-1678245961060-511f8def38aa3.jpg
The Benefits of Threat Modeling
Ask A CISO
40 minutes 24 seconds
2 years ago
The Benefits of Threat Modeling

We are really excited about this episode because it's the first time this season that we are taking a deep dive into Threat Modeling with our esteemed guests, Izar Tarandach and Matthew J. Coles.

If you're curious about threat modeling, join host Jeremy Snyder and our esteemed guests to learn of its benefits as they discuss their motivations for writing the book Threat Modeling: A Practical Guide for Development Teams and explain why it is essential to involve developers and other team members in the process.

We also cover “shift left” security and discuss the value of incorporating threat modeling techniques to provide documentation, inform decision-makers, and help manage risk.

Read the associated short blog on what Threat Modeling is:
https://www.horangi.com/blog/the-benefits-of-threat-modeling

- About Horangi Cybersecurity --
More information about the Ask A CISO podcast: https://www.horangi.com/resources/ask-a-ciso-podcast
About Horangi Cyber Security: https://www.horangi.com

- About the Guests --
Izar's LinkedIn: https://www.linkedin.com/in/izartarandach/
Matt Coles' LinkedIn: https://www.linkedin.com/in/matthew-coles-4330652/

Ask A CISO
The Ask A CISO podcast is brought to you by Horangi Cyber Security, Asia's leader in cloud security. Every week, we chat with prominent CISOs and industry veterans from all over the world to get their insights into the most pressing cybersecurity issues today and tomorrow's challenges. For more information, visit Horangi at https://www.horangi.com.