This document discusses threat modeling and how to properly scope security assessments. It provides examples of how threat modeling can be applied, including getting the full scope of the system correct and identifying risks. The document warns that developer laptops and conferences pose security risks and outlines some mitigation approaches like two-factor authentication and separation of duties. The overall message is that modern development approaches require keeping security top of mind.