Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingGlassNovember 30, 2023

In this episode, Matt Rose explains how a comprehensive SBOM can assist with the threat modeling of both existing and future software applications.

Learn More

- Webinar: Threat modeling and the software supply chain: Why it matters more than ever
- Blog: Threat modeling and the supply chain: An essential tool for managing risk
- Definition: What is threat modeling?

Episode Transcript

MATT ROSE: Hi, everyone. Welcome back to another episode of ReversingGlass. I'm Matt Rose, Field CISO at ReversingLabs. Today's episode is SBOM plus Threat Modeling or SBOM and Threat Modeling. I recently did a webinar with a Threat Modeling expert. You might have heard of him. His name is Chris Romeo. He is one of the industry leaders in Threat Modeling.

He does a lot of talking on Threat Modeling. And we talked about threat modeling and software supply chain or software supply chain security. But one of the things that kind of came out of the conversation is the process to not only create a threat model for a future application but for existing applications.

Continuous threat modeling, as you will. Something that already exists. How do you threat model something that's already in existence? Well, this got me thinking. With the Executive Order 14028 and the follow on memorandum associated with increasing the nation's cybersecurity resilience and self attestation and SBOMs.

Think of it this way, because threat modeling is a very, very important aspect and practice for securing your application. It's really two phases for a threat modelist, the design and then saying, what the heck could happen to this thing? But a lot of times it's only as good as the people that are doing the threat modeling, and there's always that "error is human" type aspect.

So thinking about an SBOM, if you do have a comprehensive SBOM in an industry recognized format like Cyclone DX or SPDX, it won't basically validate the completeness of your threat model that you're not missing any packages, first party code or frameworks or open source packages or even COT software as part of it.

So think about it this way. If you take the package that you've created, you run binary analysis against it, which then creates a SBOM in your chosen format - Cyclone DX, SPDX - now you have something that could really drive an appropriate and more comprehensive, more accurate threat model. So think about this: SBOMs are important, but SBOMs may have uses that you're not even thinking about it. Just understanding what's in there, but it could actually help springboard your whole program of threat modeling because now you have a foundational document to start your threat modeling in. You know all the frameworks, you know all the open source packages, and it allows you to threat model much more effectively than just hoping you've got everything and you don't have that "the error is human" aspect.

That's this episode. Hope you enjoyed it. I'm Matt Rose, Field CISO at ReversingLabs. Thank you for watching everybody.

FacebookFacebookXX / TwitterLinkedInLinkedInbluesky

Field CISO at ReversingLabs. Matt Rose has an extensive background in application security, object-oriented programming, multi-tier architecture design and implementation, and internet/intranet development. His areas of expertise include Application Security, SAST, DAST, IAST, SCA, DevSecOps, and Threat Modeling. Matt is an accomplished public speaker and has been quoted in 50+ AST industry media publications.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs

Related episodes

ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Product & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Bluesky
Email Us
ReversingGlass with Matt Rose

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky
Typosquatting and software supply chain security

Typosquatting and software supply chain security

Learn More about Typosquatting and software supply chain security
Typosquatting and software supply chain security
title card

SCA Is Good. SSCS Is Better.

Learn More about SCA Is Good. SSCS Is Better.
SCA Is Good. SSCS Is Better.
ReversingGlass on Reproducible Builds: Graduate Your Application Security

Reproducible Builds: Graduate Your Application Security

Learn More about Reproducible Builds: Graduate Your Application Security
Reproducible Builds: Graduate Your Application Security

The 2025 Software Supply Chain Security Report

Learn More about The 2025 Software Supply Chain Security Report
The 2025 Software Supply Chain Security Report

Get Started: Request a Demo

Learn more about how ReversingLabs can help your company reduce attack surface risks with deep software and file threat analysis to speed release and response.

Request a Demo

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.