Building a Defense-in-Depth StrategyLevel 3's Chris Richter on Applying Threat Intelligence
Fighting fraud requires a well-rounded, defense-in-depth strategy that makes good use of appropriate threat intelligence, says Chris Richter of Level 3 Communications.
See Also: Secure Access in a Hybrid IT World
An essential first step, he says, is selecting a good governance framework that can be used to build a security risk management program. "Without that, you don't have a really good sense of how to apply funding and capital and infrastructure to protect your core assets," he says.
In an interview at Information Security Group's Fraud Summit Chicago, Richter explains:
- The essential elements of a defense-in-depth strategy;
- How to apply threat intelligence to such a strategy;
- The four categories of threat intelligence and how each can be applied;
- How to apply the right technology and the right framework to make use of threat intelligence.
Richter is senior vice president, managed security services at Level 3 Communications, and is responsible for the company's global managed and professional security services line of business. With 30 years of experience in IT, Richter has held a number of leadership positions in managed security, IT consulting and sales with several technology product and services organizations. His most recent previous position was vice president, managed security services, at CenturyLink.