SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Threat modelling is often presented as a theoretical activity, something reserved for whiteboards or security assessments that rarely translates to day-to-day decisions. In practice, however, effective threat modelling is a business enabler. It becomes a mechanism security teams can use to justify investments, prioritise controls, and align their strategies with organisational risk. This article outlines a practical approach to threat modelling that draws on community resources and proven governance practices.
Many organisations acknowledge the importance of threat modelling but struggle to implement it effectively. Too often, the exercise is reduced to filling out forms or generating theoretical diagrams. The models are created, but they don’t influence which controls get funded or how risk is communicated to leadership.
This disconnect usually stems from one core issue: modelling is being done without a clear understanding of its purpose. If you're not tying threats to decisions, whether that’s about patching, architecture, or investments, you’re just modelling for modelling’s sake.
Threat modelling can serve three distinct purposes. First, it can be used to support vulnerability management, identifying software or infrastructure weaknesses so remediation can be prioritised. Second, it can aid asset prioritisation, helping clarify which business functions or systems are most critical and require stronger protections. But the most impactful use case is safeguard selection. When you map threats directly to the controls that can mitigate them, threat modelling becomes a strategic tool. It helps you show which safeguards matter most, where the gaps are, and what needs funding.
A frequent modelling stumbling block is when teams try to invent their own threat taxonomy from scratch. While it might seem more tailored or flexible, it’s an enormous task and one that rarely delivers better results than starting with a community-driven taxonomy.
Resources like the MITRE ATT&CK framework, NIST SP 800-30, and the CRF Threat Taxonomy provide mature, well-vetted starting points. These taxonomies come with shared definitions and structures that are broadly understood across the industry. Using them not only saves time, but it allows for better benchmarking, easier collaboration with peers, and smoother integration with security tooling.
You don’t have to use them out-of-the-box. Most organisations tend to start with a community framework and adapt it to their unique risk posture, regulatory environment, or business structure. But starting from a blank slate can actively delay your ability to produce useful results.
To make threat modelling genuinely useful, it is recommended to follow a four-step process that builds incrementally, supports automation, and scales well across different business units or system domains.
The operational reality is that threat models must evolve. If your threat model is a one-time deliverable from a consulting engagement, it’s obsolete the moment the ink dries. Treat it like an asset, something that needs care, feeding, and updates as the business and threat landscape change.
When implemented effectively, threat modelling is a governance tool. It connects technical security decisions to strategic priorities. It provides a defensible way to justify budgets. It aligns operational controls with business risk, and also gives security leaders a way to communicate risk without jargon. Instead of talking about "TTPs" or "zero-days," you’re talking about protecting business continuity, customer trust, and regulatory posture. When you can quantify protection in terms of continuity, trust, and compliance, threat modelling becomes a language executives understand.
If you’re just getting started, here’s a simple and repeatable starting point:
Pilot the process with a single system or application, something that is important but manageable. Use a community taxonomy like MITRE ATT&CK or the CRF Threat Taxonomy. Build an initial threat list of 10 to 20 items. Score them with a simple model. Map them to your current safeguards. Look for the obvious gaps. Then brief your leadership—not with the full model, but with a summary of the top threats, mitigation status, and options for addressing them.
Capture what worked, refine your process, and repeat in the next domain.
Threat modelling should never be a checkbox. It’s a powerful tool when grounded, structured with care, and aligned to governance. By leveraging community templates, applying structured scoring, and connecting threats to controls, organisations can build a modelling practice that informs decisions, guides investments, and strengthens posture.
Start small. Stay consistent and practical. And let the results speak for themselves.


James is a managing partner at Cyverity, specializing in cybersecurity risk and governance. A SANS instructor for 20+ years, he holds 14 GIAC certs including the GSE, and has helped author the CIS Controls, CRF resources, and courses like LDR419 and LDR519.
Read more about James Tarala