Secret agents, wargames, and threats, oh my!

In this videocast, I talk about some of the key tools used at Intel to understand current and future risks and threats (including secret agents!)

Some links to additional information are below...

<script type="text/javascript" src=""></script>
<object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase=",0,0,0" width="320" height="269" id="player23319fab46a2411e99f6e6b6c4dd78d8" align="middle"><param name="allowScriptAccess" value="always" /><param name="FlashVars" value="content=" height="269" width="320" /><param name="movie" value="" /><param name="quality" value="high" /><param name="scale" value="noscale" /><param name="bgcolor" value="#000000" /><embed name="player23319fab46a2411e99f6e6b6c4dd78d8" type="application/x-shockwave-flash" src="" flashvars="content=" height="269" width="320" allowScriptAccess="always" ></embed></object>
<noscript>Your browser does not support JavaScript. This media can be viewed at <a href=""></a></noscript>


What are the tools you use in managing risks? Are they off-the-shelf or developed internally? And do you ever get to wear a tux while at work?


Here are some links for more information:

My presentation on corporate infosec Wargaming for the upcoming Intel Premier IT Professional (IPIP) events:

Our Threat Agent Library is available for anyone to use. A whitepaper describing it is here:

Matthew Rosenquist's latest blog on security is a great discussion about Security in Depth: