
How to operationalize threat modeling for privacy
09/18/23 • 0 min
In this episode, Jayati Dev unveils a unique approach to threat modeling: using personas. Discover why developers resonate with this method and how it enhances communication with executives. Dive into real-world breach examples to assess application vulnerabilities and learn about vital mitigation measures. Tune in for an insightful cybersecurity conversation!
In this episode, Jayati Dev unveils a unique approach to threat modeling: using personas. Discover why developers resonate with this method and how it enhances communication with executives. Dive into real-world breach examples to assess application vulnerabilities and learn about vital mitigation measures. Tune in for an insightful cybersecurity conversation!
Previous Episode

Elon Musk's DOJ Accusations, Delaware's New Data Protection Law & UK GDPR Changes
Navigate the intricate maze of data privacy with the "Privacy Corner" podcast! Join Robert Bateman, a seasoned privacy advocate and industry expert, as he delves deep into the week's most pressing privacy stories from around the world. From corporate takeovers and their unforeseen data repercussions to evolving state legislations and international data protocols, Robert brings clarity to the often clouded waters of the digital privacy realm.
In this episode:
- 🌐 The Twitter Tangle: Journey through the fascinating revelations from a recent court finding about Twitter (or should we say 'X'?) during Elon Musk's early days at the helm.
- 📜 Delaware's Privacy Playbook: An in-depth analysis of Delaware's newly minted privacy law. Does it set a precedent or simply follow the crowd?
- 🇬🇧 UK's GDPR Shake-Up: The UK contemplates a seismic shift in its GDPR stance. Together, we unpack its implications and the bigger picture it paints for global data protection.
Next Episode

New 'Zero-Click' Spyware Infects Through Ads, Kids' Privacy Law Controversy, and EU-US Data Privacy Tensions Rise
In privacy news this week:
- Dive into the alarming rise of "Sherlock", the zero-click spyware infiltrating through targeted ads and its potential global implications.
- Delve deep into the California Age-Appropriate Design Code Act's controversy, touching upon the tension between kids' online safety and free speech rights.
- Traverse the tumultuous waters of the EU-US Data Privacy Framework, exploring the growing challenges and what it means for data transfer across borders.
Featuring insights from Robert Bateman and the Privado.ai team.
The Privacy Corner - How to operationalize threat modeling for privacy
Transcript
The way we have operationalized this is through personas. So it's for two reasons. One, it's something that developers are comfortable with, they know personas. And then it also helps communicate to executives about what the actual threat could be and what the impact could be. So the way threat modeling tool that we developed works is that, we tell developers a persona that is this something that can happen to your applications? If we take a real wo
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/the-privacy-corner-260572/how-to-operationalize-threat-modeling-for-privacy-33673043"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to how to operationalize threat modeling for privacy on goodpods" style="width: 225px" /> </a>
Copy