Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
The Privacy Corner - How to operationalize threat modeling for privacy

How to operationalize threat modeling for privacy

09/18/23 • 0 min

The Privacy Corner

In this episode, Jayati Dev unveils a unique approach to threat modeling: using personas. Discover why developers resonate with this method and how it enhances communication with executives. Dive into real-world breach examples to assess application vulnerabilities and learn about vital mitigation measures. Tune in for an insightful cybersecurity conversation!

plus icon
bookmark

In this episode, Jayati Dev unveils a unique approach to threat modeling: using personas. Discover why developers resonate with this method and how it enhances communication with executives. Dive into real-world breach examples to assess application vulnerabilities and learn about vital mitigation measures. Tune in for an insightful cybersecurity conversation!

Previous Episode

undefined - Elon Musk's DOJ Accusations, Delaware's New Data Protection Law & UK GDPR Changes

Elon Musk's DOJ Accusations, Delaware's New Data Protection Law & UK GDPR Changes

Send us a text

Navigate the intricate maze of data privacy with the "Privacy Corner" podcast! Join Robert Bateman, a seasoned privacy advocate and industry expert, as he delves deep into the week's most pressing privacy stories from around the world. From corporate takeovers and their unforeseen data repercussions to evolving state legislations and international data protocols, Robert brings clarity to the often clouded waters of the digital privacy realm.

In this episode:

  • 🌐 The Twitter Tangle: Journey through the fascinating revelations from a recent court finding about Twitter (or should we say 'X'?) during Elon Musk's early days at the helm.
  • 📜 Delaware's Privacy Playbook: An in-depth analysis of Delaware's newly minted privacy law. Does it set a precedent or simply follow the crowd?
  • 🇬🇧 UK's GDPR Shake-Up: The UK contemplates a seismic shift in its GDPR stance. Together, we unpack its implications and the bigger picture it paints for global data protection.

Next Episode

undefined - New 'Zero-Click' Spyware Infects Through Ads, Kids' Privacy Law Controversy, and EU-US Data Privacy Tensions Rise

New 'Zero-Click' Spyware Infects Through Ads, Kids' Privacy Law Controversy, and EU-US Data Privacy Tensions Rise

Send us a text

In privacy news this week:

  • Dive into the alarming rise of "Sherlock", the zero-click spyware infiltrating through targeted ads and its potential global implications.
  • Delve deep into the California Age-Appropriate Design Code Act's controversy, touching upon the tension between kids' online safety and free speech rights.
  • Traverse the tumultuous waters of the EU-US Data Privacy Framework, exploring the growing challenges and what it means for data transfer across borders.

Featuring insights from Robert Bateman and the Privado.ai team.

The Privacy Corner - How to operationalize threat modeling for privacy

Transcript

Jayati

The way we have operationalized this is through personas. So it's for two reasons. One, it's something that developers are comfortable with, they know personas. And then it also helps communicate to executives about what the actual threat could be and what the impact could be. So the way threat modeling tool that we developed works is that, we tell developers a persona that is this something that can happen to your applications? If we take a real wo

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/the-privacy-corner-260572/how-to-operationalize-threat-modeling-for-privacy-33673043"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to how to operationalize threat modeling for privacy on goodpods" style="width: 225px" /> </a>

Copy