Chris Romeo (@edgeroute) 's Twitter Profile
Chris Romeo

@edgeroute

Christian; Husband; Dad; CEO Devici, GP @Kerr_Ventures: @AppSecPodcast @SecTablePodcast | #AppSec, #ThreatModeling, and #Startups

ID: 132733227

linkhttps://devici.com calendar_today14-04-2010 01:37:55

7,7K Tweet

3,3K Followers

505 Following

Steve Wilson (@virtualsteve) 's Twitter Profile Photo

🚀 Launch Day is Here! 🚀 After more than a year of hard work, I’m proud to announce the release of The Developer’s Playbook for Large Language Model Security, published by O'Reilly Media! 🎉 Huge thanks to @Exabeam and OWASP® Foundation for your support. This book dives into securing AI

🚀 Launch Day is Here! 🚀

After more than a year of hard work, I’m proud to announce the release of The Developer’s Playbook for Large Language Model Security, published by <a href="/OReillyMedia/">O'Reilly Media</a>! 🎉 Huge thanks to @Exabeam and <a href="/owasp/">OWASP® Foundation</a> for your support.

This book dives into securing AI
Chris Romeo (@edgeroute) 's Twitter Profile Photo

Join us for this interactive #threatmodeling experience to celebrate Cyber Month. I'll be leading the workshop, and best of all, it's free.

Chris Romeo (@edgeroute) 's Twitter Profile Photo

In case you haven't seen the calendar, it's October, which means Cyber Awareness time. To celebrate October, Devici is hosting a series of free threat modeling workshops entitled "Maybe You Should Threat Modeled That…". The workshop is a team-based game, where you'll threat

The Security Table Podcast (@sectablepodcast) 's Twitter Profile Photo

Boring can be...good? Check out the latest episode of The Security Table, where we discuss the current state of cybersecurity. Catch the episode here: buff.ly/4dMX8PR #TheSecurityTable #securitytalk #newepisode

Boring can be...good? Check out the latest episode of The Security Table, where we discuss the current state of cybersecurity. Catch the episode here: buff.ly/4dMX8PR 

#TheSecurityTable #securitytalk #newepisode
ReversingLabs (@reversinglabs) 's Twitter Profile Photo

Chris Romeo (Chris Romeo) shares 5 key ways to merge #ThreatModeling with #SoftwareSupplyChainSecurity — & improve your #SoftwareRisk management in the process 👇 bit.ly/3Y7lfmG

devici threat modeling (@devici_appsec) 's Twitter Profile Photo

Join ReversingLabs for Supercharging Threat Modeling with Supply Chain Security! ⚡ Chris Romeo from @Devici, Josh Knox, & Paul Roberts will show you how modern SSCS transforms threat modeling. 🛡️🔗hubs.ly/Q02V8nxb0 #ThreatModeling #AppSec #CyberSecurity #ReversingLabs

ReversingLabs (@reversinglabs) 's Twitter Profile Photo

Learn how to supercharge your #ThreatModeling with #SoftwareSupplyChainSecurity in this webinar happening on 10/29 at 12pm ET, ft. Chris Romeo, Knox & Paul Roberts 👇 bit.ly/3zW0CBT

The Security Table Podcast (@sectablepodcast) 's Twitter Profile Photo

Join us as we untangle the intricate web of device obsolescence and its security implications. What happens when the services we rely on suddenly disappear? Listen here: buff.ly/40hhXQr #TheSecurityTablePodcast #TechTalk #Innovation

Join us as we untangle the intricate web of device obsolescence and its security implications. What happens when the services we rely on suddenly disappear? Listen here: buff.ly/40hhXQr  
#TheSecurityTablePodcast #TechTalk #Innovation
devici threat modeling (@devici_appsec) 's Twitter Profile Photo

Join ReversingLabs for a webinar on Supercharging Threat Modeling! 🛡️ Chris Romeo, Josh Knox, and Paul Roberts talk modern SSCS can amp threat modeling beyond AST & SCA tools. Register: hubs.ly/Q02V91j-0 #Webinar #CyberSecurity #SupplyChainSecurity #SSCS #ThreatModeling

The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

Kayra Otaner joins the Podcast to discuss the controversial topic of whether DevSecOps is dead, explore the dynamics of Zero Trust, and unpack the significance of Security as Code. Check out the episode here: buff.ly/3YFh1E9

Kayra Otaner joins the Podcast to discuss the controversial topic of whether DevSecOps is dead, explore the dynamics of Zero Trust, and unpack the significance of Security as Code. Check out the episode here:  buff.ly/3YFh1E9
The Security Table Podcast (@sectablepodcast) 's Twitter Profile Photo

Our newest episode of The Security Table dives into the world of product security. We're discussing CISA’s recent security practices and learning lessons from past vulnerabilities. Want to know how to truly shift left or start left in development? buff.ly/4hwhcJD

Our newest episode of The Security Table dives into the world of product security. We're discussing CISA’s recent security practices and learning lessons from past vulnerabilities. Want to know how to truly shift left or start left in development? buff.ly/4hwhcJD
The Security Table Podcast (@sectablepodcast) 's Twitter Profile Photo

Is threat modeling really dead? Today we dissect the arguments, explore modern security practices, and ask if it's time for a refresh in STRIDE categories. Don't miss it, click here to listen: buff.ly/48Om8p9 #SecurityModels #ThreatModeling #STRIDE #Cybersecurity

Is threat modeling really dead? Today we dissect the arguments, explore modern security practices, and ask if it's time for a refresh in STRIDE categories. Don't miss it, click here to listen: buff.ly/48Om8p9   #SecurityModels #ThreatModeling #STRIDE #Cybersecurity
The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

Brett Crawley, a principal application security engineer and lead on the OWASP application security awareness campaign project joins us to talk threat modeling using games. Learn how integrating fun into security can enhance engagement and understanding. buff.ly/3BiGsTb

Brett Crawley, a principal application security engineer and lead on the OWASP application security awareness campaign project joins us to talk threat modeling using games. Learn how integrating fun into security can enhance engagement and understanding.  buff.ly/3BiGsTb
The Security Table Podcast (@sectablepodcast) 's Twitter Profile Photo

We’re debating the necessity of LLMs in tech, reminiscing about classic video games, and sharing thoughts on self-healing systems. Listen along as we discuss LLM usage and explore security testing techniques. Check it out here: buff.ly/49q0FTV #Cybersecurity #TechTalk

We’re debating the necessity of LLMs in tech, reminiscing about classic video games, and sharing thoughts on self-healing systems. Listen along as we discuss LLM usage and explore security testing techniques. Check it out here: buff.ly/49q0FTV #Cybersecurity #TechTalk
The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

We’re discussing the ever-evolving world of AI in AppSec with our guest, Sarah Jane Madden. We explore the impact of AI on software development and security and how to navigate these dynamic changes. Listen to the episode here: youtu.be/GsJ8tbcjUuk

We’re discussing the ever-evolving world of AI in AppSec with our guest, Sarah Jane Madden. We explore the impact of AI on software development and security and how to navigate these dynamic changes. Listen to the episode here:  youtu.be/GsJ8tbcjUuk
The Security Table Podcast (@sectablepodcast) 's Twitter Profile Photo

Our special guest, Petra Vukmirovic explains the idea of an open-source threat modeling library and the potential impact on enhancing security practices. Check out the episode now to learn more about the project and how it could help you. Watch it here: youtu.be/uN5W5YAulD0

The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

Our guest, Sarah-Jane Madden gives her take on all the change we have going on all around us including AI and its effect on the threat modeling world. Listen to the full episode here: youtu.be/GsJ8tbcjUuk #ThreatModeling #AI #Innovation

The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

Our latest episode has guest, Sean Varga breaking down his OWASP Top 10 for AppSec Sales. Listen to how living documents, trusted partners, and understanding customer needs can drive success. Click here to listen: youtu.be/tbT88_mDjEc

Our latest episode has guest, Sean Varga breaking down his OWASP Top 10 for AppSec Sales. Listen to how living documents, trusted partners, and understanding customer needs can drive success. Click here to listen: youtu.be/tbT88_mDjEc
The Application Security Podcast (@appsecpodcast) 's Twitter Profile Photo

Is your security dashboard lying? Our guest today, Aram Hovsepyan helps us uncover the myths behind common security metrics and shares how to truly assess risk and readiness. Listen to the new episode here: youtu.be/3z10qVEFWNM

Is your security dashboard lying? Our guest today, Aram Hovsepyan helps us uncover the myths behind common security metrics and shares how to truly assess risk and readiness. Listen to the new episode here: youtu.be/3z10qVEFWNM
The Security Table Podcast (@sectablepodcast) 's Twitter Profile Photo

We’re looking into the startup world’s biggest misconception. Too many entrepreneurs are asking "What problem should I solve?" instead of "How do I solve this problem that's been driving me crazy?" Listen now: youtu.be/PnD6r12RUN0 #Cybersecurity #Startups #AISecurity

We’re looking into the startup world’s biggest misconception. Too many entrepreneurs are asking "What problem should I solve?" instead of "How do I solve this problem that's been driving me crazy?" Listen now: youtu.be/PnD6r12RUN0
#Cybersecurity #Startups #AISecurity