This document discusses strategies for moving from secure code reviews to threat modeling. It begins with an introduction of the speaker and their background. It then discusses what the talk will and won't cover. The document outlines the mechanics of code reviews and different analysis approaches like control flow, data flow, taint, and lexical analysis. It discusses strengths and weaknesses of code reviews. The remainder of the document focuses on threat modeling, defining key terms, the STRIDE methodology, defining trust boundaries, threat analysis, risk ranking, and automation opportunities.