Show notes
How do you decide what the priorities are for your digital resilience? How much resilience is enough? How many backups do you need? How much privacy do you need? Today I describe a way to make those decisions through a process called Threat Modeling