Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 The Southwest’s Wildest Outdoor Art: From Lightning Fields to Sun Tunnels 30:55
Threat Modeling Parts of the User Journey That Cost Your Business Money With Adam Shostack
Manage episode 435588725 series 2836702
“Even though usability and security tradeoffs will always be with us, we can get much smarter. Some of the techniques are really simple. For one, write everything down a user needs to do in order to use your app securely. Yeah, keep writing.”
In this episode, we talk about:
- What is threat modeling and why should product teams and UX designers care about it? (Also check out Adam’s first episode on Human-Centered Security).
- Focus on parts of the user journey where you might gain or lose customers: what tradeoffs between usability and security are you making here?
- Involve a cross-disciplinary team from the very beginning. This is critiical: “How do we get focused on the parts of the problem that matter so we don’t spend forever on the wrong stuff?”
Adam Shostack is an expert on threat modeling, having worked at Microsoft and currently running security consultancy Shostack + Associates. He is the author of The New School of Information Security, Threat Modeling: Designing for Security and Threats: What Every Engineer Should Learn From Star Wars. Adam’s YouTube channel has entertaining videos that are also excellent resources for learning about threat modeling.
55 episodes
Manage episode 435588725 series 2836702
“Even though usability and security tradeoffs will always be with us, we can get much smarter. Some of the techniques are really simple. For one, write everything down a user needs to do in order to use your app securely. Yeah, keep writing.”
In this episode, we talk about:
- What is threat modeling and why should product teams and UX designers care about it? (Also check out Adam’s first episode on Human-Centered Security).
- Focus on parts of the user journey where you might gain or lose customers: what tradeoffs between usability and security are you making here?
- Involve a cross-disciplinary team from the very beginning. This is critiical: “How do we get focused on the parts of the problem that matter so we don’t spend forever on the wrong stuff?”
Adam Shostack is an expert on threat modeling, having worked at Microsoft and currently running security consultancy Shostack + Associates. He is the author of The New School of Information Security, Threat Modeling: Designing for Security and Threats: What Every Engineer Should Learn From Star Wars. Adam’s YouTube channel has entertaining videos that are also excellent resources for learning about threat modeling.
55 episodes
All episodes
×
1 Here Comes the Sludge with Kelly Shortridge and Josiah Dykstra 43:23

1 Human-Centered Security In the Wild: Jordan Girman and Mike Kosak On Security and Product Team Collaboration at Lastpass 40:04

1 Dear Security Vendors, Here’s What Security Teams Want You to Know with Paul Robinson 36:41

1 From Tools to Teammates: (Dis)Trust in AI for Cybersecurity with Neele Roch 36:47

1 Introducing Human-Centered Security: The Book 32:08

1 Threat Actors Leverage Behavioral Science; Security Teams Should, Too with Matt Wallaert 39:21

1 Tech & Law: The Power of Understanding Both With Justine Phillips 45:24

1 Complexity Undermines Security With Bill Bonney, Gary Hayslip, and Matt Stamper 47:11

1 Security Tools Don’t Get a Free Pass When It Comes to Human-Centered Design with Jaron Mink 43:30

1 Leverage UX Research to Improve the Security User Experience with Serge Egelman 31:32

1 Help Security Analysts Tell the Story Behind the Threats with Shante Perrin 28:58

1 Putting Human-Centered Security Into Practice with Julie Haney 50:50

1 So Much Data, So Little Time—Designing for Security Workflows with Tom Harrison 31:07

1 Threat Modeling Parts of the User Journey That Cost Your Business Money With Adam Shostack 47:01

1 No Room for Hype When Integrating AI Into Cybersecurity Products with John Robertson and Siddharth Hirwani 35:58

1 What Do You Know About Alert Fatigue? An Interview with John Robertson 19:31

1 How to Build Trust Through the User Experience with Carlie Hundt and Devon Hirth 45:04

1 Understand the Holistic Experience to Improve Cybersecurity Products with Lindsey Wallace 50:33

1 Include Users with Disabilities in Your Security UX Research with Joyce Oshita 49:29

1 Leveraging Data Science to Help Security Teams with Serge-Olivier Paquette 41:58

1 What Designers Need to Know About Digital Identity and Access with David Mahdi 45:27

1 Bake Security Into the DNA of Your Product and Improve the Security User Experience with Darren Thomas and Margaret Cunningham 41:09

1 What UX Designers Need to Know About Privacy with Michelle Finneran Dennedy 50:13

1 Learning and Iterating Are Key to Improving the Security User Experience with Kevin Goldman 45:16

1 Build a UX of AI Framework for Your Cross-Disciplinary Team with John Robertson 44:08

1 Build Security and UX Into Your Product Development Process with Ali Cuthbertson and Jason Telner 38:37

1 Designing for Cybersecurity Power Users with Tom Keenoy 33:16

1 Security Engineers Hate CAPTCHAs, Too with Jason Puglisi 40:06

1 Threat Modeling for UX Designers with Adam Shostack 40:35

1 Designing Multi-Factor Authentication with Blair Shen and Bethany Sonefeld 38:20
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.