Using Intelligence to Fight APTsData from Various Sources Can Help Organizations Identify Intrusions Sooner
Attacks waged for cyberespionage and the theft of intellectual property often go overlooked, he adds. Though often overlooked, more organizations are figuring out they have to rely on information from outside sources to first determine they're being pinpointed for a strike, and then they have to work backwards to determine who is waging the attack and why.
"You have to look at the entire lifecycle of the threat to truly know what these attacks are doing and understand what solutions need to be implemented to prevent data losses," Wood says.
During this interview, Wood discusses:
- Why solely focusing on malware detection is a losing proposition;
- The critical role incident response plays in risk mitigation;
- Why more organizations are realizing they're more vulnerable than they once thought.
Wood is responsible for managed security for cloud services at Dell SecureWorks. He has more than 25 years of experience in the technology community as a software engineer, sales engineer, a start-up owner and a product manager. Before joining SecureWorks, Wood oversaw product strategy, lifecycle management and optimization of existing products for Cloud Sherpas, a solutions provider focused on migrating organizations to Google Apps. He has also worked in marketing and product management at a number of leading technology companies, including nCircle, Internet Security Systems (ISS) and AT&T Bell Laboratories.
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.