Secret agents, wargames, and threats, oh my!

In this videocast, I talk about some of the key tools used at Intel to understand current and future risks and threats (including secret agents!)

Some links to additional information are below...

<br>
<script type="text/javascript" src="http://www.podtech.net/player/popup.js"></script>
<object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=8,0,0,0" width="320" height="269" id="player23319fab46a2411e99f6e6b6c4dd78d8" align="middle"><param name="allowScriptAccess" value="always" /><param name="FlashVars" value="content=http://media1.podtech.net/media/2007/10/PID_012944/Podtech_Intel_TimCasey_ManagingInforma.flv&totalTime=509000&permalink=http://www.podtech.net/home/4482/security-plan-risk-assessment-modeling-and-war-gaming&breadcrumb=e2c155af0c544de4be840643d1c2d5fc" height="269" width="320" /><param name="movie" value="http://www.podtech.net/player/podtech-player.swf?bc=e2c155af0c544de4be840643d1c2d5fc" /><param name="quality" value="high" /><param name="scale" value="noscale" /><param name="bgcolor" value="#000000" /><embed name="player23319fab46a2411e99f6e6b6c4dd78d8" type="application/x-shockwave-flash" src="http://www.podtech.net/player/podtech-player.swf?bc=23319fab46a2411e99f6e6b6c4dd78d8" flashvars="content=http://media1.podtech.net/media/2007/10/PID_012944/Podtech_Intel_TimCasey_ManagingInforma.flv&totalTime=509000&permalink=http://www.podtech.net/home/4482/security-plan-risk-assessment-modeling-and-war-gaming&breadcrumb=23319fab46a2411e99f6e6b6c4dd78d8" height="269" width="320" allowScriptAccess="always" ></embed></object>
<noscript>Your browser does not support JavaScript. This media can be viewed at <a href="http://www.podtech.net/home/4482/security-plan-risk-assessment-modeling-and-war-gaming">http://www.podtech.net/home/4482/security-plan-risk-assessment-modeling-and-war-gaming</a></noscript>

<br>

What are the tools you use in managing risks? Are they off-the-shelf or developed internally? And do you ever get to wear a tux while at work?

<br>

Here are some links for more information:

My presentation on corporate infosec Wargaming for the upcoming Intel Premier IT Professional (IPIP) events:

Our Threat Agent Library is available for anyone to use. A whitepaper describing it is here:

Matthew Rosenquist's latest blog on security is a great discussion about Security in Depth: