Episode 18 — Threat Modeling Like You Mean It: Actors, Motivations, Resources, Capabilities

This episode explains threat modeling as a practical way to predict likely attack paths and choose controls with intent, which SecurityX tests by presenting scenarios where you must reason about who the attacker is and what they can realistically do. You’ll define threat actors in meaningful categories, such as insiders, cybercriminal groups, nation-state operators, hacktivists, and opportunistic attackers, then connect each category to typical motivations like financial gain, espionage, disruption, or coercion. We’ll explore how resources and capabilities shape risk, including access to tooling, patience, intelligence, and operational security, and how those factors influence the plausibility of sophisticated techniques versus noisy commodity attacks. You’ll learn to separate “possible” from “probable” by analyzing target attractiveness, opportunity, and constraints, which helps you avoid overbuilding controls that do not address the dominant risks. Practical examples include comparing an attacker who can phish a single user versus one who can compromise a supplier build pipeline, and how those different models lead to different priorities in identity hardening, segmentation, monitoring, and recovery. By the end, you should be able to read a scenario, identify the likely actor profile, and choose the control strategy that best reduces risk for that profile. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 18 — Threat Modeling Like You Mean It: Actors, Motivations, Resources, Capabilities
Broadcast by