Fraud Management & Cybercrime , Governance & Risk Management , Insider Threat

Preempting the Attacker's Next Move

Tony Richards and Tim Erridge on Strengthening Threat Intel Capabilities
Tony Richards, Office of the CISO, Google Cloud (left); Tom Erridge, Vice President of Service, Unit 42, Palo Alto Networks

Threat intelligence is increasingly recognized as an important weapon of an organization's defense strategy. Understanding who is targeting your enterprise, their motivations and capabilities is required to predict the threat actor's next move.

The continual tracking and interpreting of large amounts of dispersed data, however, as well as regular reevaluation and development of the right skills and resources, have made it challenging for businesses to cultivate mature threat intelligence capabilities.

How can security leaders strengthen their threat intelligence programs to successfully preempt future attacks?

In this interview with Information Security Media Group, Tony Richards, Office of the CISO, Google Cloud, and Tim Erridge, Vice President of Services, Unit 42 Palo Alto Networks, discuss:

  • Strategies to synthesize and operationalize threat intelligence and interpret threat actors' motivations and capabilities;
  • Tips on how to prioritize and allocate resources more efficiently;
  • Techniques to translate threat analysis to the board.

About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.