Breach Preparedness , Cybersecurity , Data Breach

Building a Defense-in-Depth Strategy

Level 3's Chris Richter on Applying Threat Intelligence
Building a Defense-in-Depth Strategy

Fighting fraud requires a well-rounded, defense-in-depth strategy that makes good use of appropriate threat intelligence, says Chris Richter of Level 3 Communications.

See Also: 2016 IAM Research: Where Financial Institutions' PAM Programs Are Falling Short

An essential first step, he says, is selecting a good governance framework that can be used to build a security risk management program. "Without that, you don't have a really good sense of how to apply funding and capital and infrastructure to protect your core assets," he says.

In an interview at Information Security Group's Fraud Summit Chicago, Richter explains:

  • The essential elements of a defense-in-depth strategy;
  • How to apply threat intelligence to such a strategy;
  • The four categories of threat intelligence and how each can be applied;
  • How to apply the right technology and the right framework to make use of threat intelligence.

Richter is senior vice president, managed security services at Level 3 Communications, and is responsible for the company's global managed and professional security services line of business. With 30 years of experience in IT, Richter has held a number of leadership positions in managed security, IT consulting and sales with several technology product and services organizations. His most recent previous position was vice president, managed security services, at CenturyLink.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the largest media company solely focused on Information Security, Risk Management, Fraud, Compliance and other related topics.

Around the Network