Threat Modeling
Define your adversary, capabilities, constraints, and what “loss” looks like. Then pick controls that match your reality, not someone else’s checklist.
- Identify assets (identity, location, devices, money, relationships).
- Map exposure points (accounts, metadata, habits, comms paths).
- Decide acceptable risk and operational budget.