Fraud Management & Cybercrime , Governance & Risk Management , Insider Threat
Preempting the Attacker's Next MoveTony Richards and Tim Erridge on Strengthening Threat Intel Capabilities
Threat intelligence is increasingly recognized as an important weapon of an organization's defense strategy. Understanding who is targeting your enterprise, their motivations and capabilities is required to predict the threat actor's next move.
The continual tracking and interpreting of large amounts of dispersed data, however, as well as regular reevaluation and development of the right skills and resources, have made it challenging for businesses to cultivate mature threat intelligence capabilities.
How can security leaders strengthen their threat intelligence programs to successfully preempt future attacks?
In this interview with Information Security Media Group, Tony Richards, Office of the CISO, Google Cloud, and Tim Erridge, Vice President of Services, Unit 42 Palo Alto Networks, discuss:
- Strategies to synthesize and operationalize threat intelligence and interpret threat actors' motivations and capabilities;
- Tips on how to prioritize and allocate resources more efficiently;
- Techniques to translate threat analysis to the board.