Security Plan – Risk Assessment, Modeling and War Gaming

October 31st, 2007 |
Image for FaceBook
Download Video FileRight click here to download video | Share Player
For more information on Intel IT Best Practices, please visit

Security risk assessments, security risk modeling, and protecting against security threats by maintaining a threat agent library — these and other programs form the basis for understanding threats to network security for Intel. In this video podcast, TIm Casey, senior strategic analyst for information security at Intel, discusses the strategy behind Intel’s efforts.

Intel maintains a “threat agent library,” with profiles of security threats, and the agents who might perpetrate them. It also uses real-time threat scenarios, or war games, to try to bring information about the actual environment together with threat agents and threats to test and improve threat response.

From fending off ordinary hackers to more organized crime or cyber terrorism, Casey’s role is like that of an IT secret agent working to keep Intel’s secrets out of the hands of real-world threat agents.

Casey blogs about IT security at IT@Intel. In a recent blog post, Power Tools in Information Risk Management, he discusses the tools he uses in managing information security risks at Intel. Check out other Intel blogs at Intel Open Port. (A recent post by Intel’s Matthew Rosenquist’s notes that the threats to network security are living, breathing opponents who are creative, knowledgeable, motivated, and have personal objectives in mind.

Related Stories: IntelSecurity

Some photos in video courtesy of: Adam Schuster, Andrew Dill, Christos (Christos_m2001), James (monkeyatlarge), Stuart Seeger, The Lucid Moment, Torstein Haldorsen and Windell Oskay, via Creative Commons Attribution 2.0 Generic License; Bill Hails and Herman Yung, via Creative Commons Attribution-No Derivative Works 2.0 Generic License; Christina X, Eduardo (tnarik), Lachlan Hardy, Mahalie,, and Rahmat Dornbrook, via Creative Commons Attribution-Share Alike 2.0 Generic License.


Posted in: Connected Social Media, Corporate, Information Technology, Intel, Intel IT, IT@Intel
Tags: , , , , , , , , , , , , , , , ,

Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:, LinkedIn, or follow him on Twitter.