Tim Casey tagged posts:

Insider Threat Field Guide

October 21st, 2015 |
Insider Threat Field Guide

IT Best Practices: One of the most serious security challenges facing enterprises today is that of insider threat. However, many enterprises do not fully understand the scope of the problem and until recently, there has been a lack of [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , ,

Security Plan – Risk Assessment, Modeling and War Gaming

October 31st, 2007 |
Security Plan – Risk Assessment, Modeling and War Gaming

Security risk assessments, security risk modeling, and protecting against security threats by maintaining a threat agent library — these and other programs form the basis for understanding threats to network security for Intel. In this video podcast, TIm Casey, senior [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

Intel IT Information Security Pro Casey Says People Throw the Bombs

September 12th, 2007 |
Intel IT Information Security Pro Casey Says People Throw the Bombs

“People are the ultimate threat,” says Tim Casey, a senior strategic analyst for information security at Intel. “People write the viruses, people throw the bombs.” In this interview with PodTech’s Jason Lopez, Casey says that security is all about being [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: , , , , , , , ,