Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Prioritizing Information Security Risks with Threat Agent Risk Assessment


Published on

Matthew Rosenquist of Intel IT has developed a Threat Agent Risk Assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat agents that are pursuing objectives that are reasonably attainable and could cause unsatisfactory losses to Intel.

Published in: Technology
  • Be the first to comment

  • Be the first to like this