Governance & Risk Management

Creating an 'Enterprise Immune System'

Darktrace's Jim Penrose on Threat Intelligence Best Practices

As cyberattacks become more sophisticated, organizations need to convert data into proactive threat intelligence, says Jim Penrose of Darktrace.

See Also: Developing a Next-Level Cyber Insurance Strategy

In a video interview at Information Security Media Group's recent 2015 Data Breach & Prevention Summit San Francisco, Penrose describes the concept of an "Enterprise Immune System," which refers to understanding the core aspects of a network to detect potential threats. He also explains:

  • How to make better use of threat intelligence to help prevent breaches; and
  • Ways in which Darktrace's technology works to leverage existing security technologies for more proactive decision making.

Penrose is executive vice president for cyber intelligence at Darktrace. Before joining the company in 2014, he spent 17 years at the National Security Agency, where he achieved the rank of defense intelligence senior level. Penrose was at the forefront of cyber operations planning and execution throughout his NSA tenure. He built the NSA Operational Discovery Center from concept to full operations in 18 months and was the first mission manager in the NSA/CSS Threat Operations Center.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.