Security Plan – Risk Assessment, Modeling and War Gaming
For more information on Intel IT Best Practices, please visit www.intel.com/IT
Security risk assessments, security risk modeling, and protecting against security threats by maintaining a threat agent library — these and other programs form the basis for understanding threats to network security for Intel. In this video podcast, TIm Casey, senior strategic analyst for information security at Intel, discusses the strategy behind Intel’s efforts.
Intel maintains a “threat agent library,” with profiles of security threats, and the agents who might perpetrate them. It also uses real-time threat scenarios, or war games, to try to bring information about the actual environment together with threat agents and threats to test and improve threat response.
From fending off ordinary hackers to more organized crime or cyber terrorism, Casey’s role is like that of an IT secret agent working to keep Intel’s secrets out of the hands of real-world threat agents.
Casey blogs about IT security at IT@Intel. In a recent blog post, Power Tools in Information Risk Management, he discusses the tools he uses in managing information security risks at Intel. Check out other Intel blogs at Intel Open Port. (A recent post by Intel’s Matthew Rosenquist’s notes that the threats to network security are living, breathing opponents who are creative, knowledgeable, motivated, and have personal objectives in mind.
Related Stories: IntelSecurity
Some photos in video courtesy of: Adam Schuster, Andrew Dill, Christos (Christos_m2001), James (monkeyatlarge), Stuart Seeger, The Lucid Moment, Torstein Haldorsen and Windell Oskay, via Creative Commons Attribution 2.0 Generic License; Bill Hails and Herman Yung, via Creative Commons Attribution-No Derivative Works 2.0 Generic License; Christina X, Eduardo (tnarik), Lachlan Hardy, Mahalie, pingnews.com, and Rahmat Dornbrook, via Creative Commons Attribution-Share Alike 2.0 Generic License.