This document presents a session on threat modeling in security architecture, discussing when to identify threats, how to approach software development, and the importance of tracking threats and assumptions. It emphasizes the need for robust mitigation strategies and understanding the interplay between different threats. The session covers practical examples, customer/vendor trust boundaries, and a generic API threat model to guide security practices.