The Value of Cyber Intelligence Capabilities

Presented by

Rich Baich CISSP,CISM; Deloitte & Touche LLP; Principal

About this talk

"The Value of Cyber Intelligence Capabilities" will present compelling reason why organizations should be adapting their existing information security programs to leverage new sources of intelligence data that focus on exposing activities occurring within the underground economy. The cyber crime landscape has evolved into a set of highly specialized criminal products and services that are able to target specific organizations, regions, and customer profiles by using a sophisticated set of malware exploits and anonymization systems which routinely evade present-day security controls. By introducing new sources of surveillance and intelligence data, organizations will become more effective at identifying and detecting criminal initiated activities that are focused on stealing information, moving money, and impacting the availability of key services and applications. This web cast will also provide insight into the steps that organizations can take to maximize their investment in existing security controls and generate actionable threat intelligence that can be leveraged across an organization. Rich has led multi-national teams designing, implementing, measuring and advising organizations to effectively and efficiently balance risk, technology and data management decisions with data protection risks, regulatory compliance issues, privacy and security controls. Baich is former CISO at ChoicePoint where he held enterprise-wide responsibility for information and technology security. Previously, he held leadership positions within NSA, McAfee and the FBI. In 2005, Baich authored "Winning as a CISO," a security executive leadership guidebook.

Related topics:

More from this channel

Upcoming talks (19)
On-demand talks (3501)
Subscribers (180245)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.