Some of my pet peeves with Threat Modeling, as its currently done by a lot of
orgs out there:
1. Threat Models are generated as tomes, rarely used by the people who need to
be using it (architects, engineering teams, business owners, even security
people)
2. Consequently, Threat Modeling does