Security Plan – Risk Assessment, Modeling and War Gaming

October 31st, 2007 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
This video file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the video file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

Security risk assessments, security risk modeling, and protecting against security threats by maintaining a threat agent library — these and other programs form the basis for understanding threats to network security for Intel. In this video podcast, TIm Casey, senior strategic analyst for information security at Intel, discusses the strategy behind Intel’s efforts.

Intel maintains a “threat agent library,” with profiles of security threats, and the agents who might perpetrate them. It also uses real-time threat scenarios, or war games, to try to bring information about the actual environment together with threat agents and threats to test and improve threat response.

From fending off ordinary hackers to more organized crime or cyber terrorism, Casey’s role is like that of an IT secret agent working to keep Intel’s secrets out of the hands of real-world threat agents.

Casey blogs about IT security at IT@Intel. In a recent blog post, Power Tools in Information Risk Management, he discusses the tools he uses in managing information security risks at Intel. Check out other Intel blogs at Intel Open Port. (A recent post by Intel’s Matthew Rosenquist’s notes that the threats to network security are living, breathing opponents who are creative, knowledgeable, motivated, and have personal objectives in mind.

Related Stories: IntelSecurity

Some photos in video courtesy of: Adam Schuster, Andrew Dill, Christos (Christos_m2001), James (monkeyatlarge), Stuart Seeger, The Lucid Moment, Torstein Haldorsen and Windell Oskay, via Creative Commons Attribution 2.0 Generic License; Bill Hails and Herman Yung, via Creative Commons Attribution-No Derivative Works 2.0 Generic License; Christina X, Eduardo (tnarik), Lachlan Hardy, Mahalie, pingnews.com, and Rahmat Dornbrook, via Creative Commons Attribution-Share Alike 2.0 Generic License.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , , , , ,
 
Posted in: Connected Social Media, Corporate, Information Technology, Intel, Intel IT, IT@Intel
 


 


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.