Is Retro = Threat Modeling a Team?

Retro people

When I had released the ⛈️☂️(⛈️☂️) Threat Modeling of Threat Modeling #meta, I had a fascinating insight:

I met a friend for lunch. My friend was so annoyed that the team had a retro in the afternoon. Apparently, retro was just the same fruitless talk again and again - and no improvement.

I asked: “Does your team suffer from admiration for the problem?”. Importing this meta threat modeling concept and applying it to retro connected the dots: Is retro = threat modeling a team? In it’s essence, we are looking at our team, it’s mission, past and upcoming tasks, capabilities and limitations. Then we elicit threats and see how we can mitigate them.

Wisdom from the ⛈️☂️(⛈️☂️) Threat Modeling of Threat Modeling #meta that makes retros suck less

Back at the computer, I could right away filter the ⛈️☂️(⛈️☂️) Threat Modeling of Threat Modeling #meta for threats that might as well apply to retro and turn it ineffective, inefficient and frustrating.

Surprisingly, the threats and mitigations really fitted retros as well. Even the detail texts worked. Only sometimes, I needed minor adjustments in the words.

Here’s the list. See ⛈️☂️(⛈️☂️) Threat Modeling of Threat Modeling #meta for the detail texts and the suggested mitigations:

What did go wrong? Or: What can go wrong?

One difference that I found is that threat modeling asks “What can go wrong?”, whereas retros ask “What did go wrong?”. If exaggerated, this yields a new threat: ⛈️ Living in the past. Teams may operate retros like incident response. And, yes, “Retro-spective” means “looking back”. I suggest they should threat model the future of their team and it’s mission.

Now what?

Here’s some directions where to go next:

  1. Are your team’s retros a success - effective, efficient, satisfying? If not, maybe wisdom from above might help. You can meta threat model your retros.

  1. With the connection in mind, how does retro solve problem scoping, threat elicitation, threat ranking, mitigation planning and execution? What can we learn from that for our threat modeling programs? And vice versa?

  1. Some vendors have strong retro culture and weak or no threat modeling. Can threat modeling somehow be “piggybacked” via retro?