Meaningful Threat Modeling for CISOs, by Anurag Agarwal

“The previous installments in this series developed an understanding the Visual, Agile, and Simple Threat (VAST) modeling methodology, threat modeling‍ methodology by showing the parallels between threat modeling an occupied home and threat models for applications and IT systems. The purpose of this series is to articulate the simplicity with which CISOs and other organizational stakeholders can receive actionable output from a mature, enterprise threat modeling practice based on the vast methodology‍. “