AppSec Decoded: Scoping and data gathering in threat modeling | Synopsys

AppSec Decoded: Scoping and data gathering in threat modeling | Synopsys

Mar 28, 2023

Learn how Synopsys handles scoping and data gathering, two of five necessary steps in creating a useful threat modeling. https://www.synopsys.com/software-integrity/resources/white-papers/threat-modeling-best-practices.html

Learn more about Synopsys Software Integrity: https://www.synopsys.com/software-integrity.html
Subscribe: https://www.youtube.com/synopsys
Follow Synopsys on Twitter: https://twitter.com/SynopsysAppsec
Like Synopsys on Facebook: https://www.facebook.com/synopsyssoftwareintegrity
Follow Synopsys Software Integrity on LinkedIn: https://www.LinkedIn.com/showcase/sw_integrity

▬ Contents of this video ▬▬▬▬▬▬▬▬▬▬

0:00 - Intro

1:25 - The goal of threat modeling

3:37 - Scoping - What you want to protect

6:02 - Data gathering - Identify components and their interactions