Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

APT & Cyber-Extortion: Who's at Risk?

ThreatTrack's Usman Choudhary on Risks and Response
APT & Cyber-Extortion: Who's at Risk?
Usman Choudhary, ThreatTrack

Despite high-profile attacks and publicity, advanced persistent threats continue to strike organizations in all sectors. How can security leaders improve defenses? ThreatTrack's Usman Choudhary offers advice.

Why, after so many highly-publicized attacks, does APT continue to be so successful?

"It's certainly not because IT security people are not smart enough, or fast enough or not making the right investments," says Choudhary, Senior Vice President and Chief Product Officer for ThreatTrack. "The attackers are highly organized, coordinated - they're motivated criminals. And they're really looking for one loose brick in your wall."

And from past successes, these attackers have gained well-heeled sponsors, and they've refined their operations and cooperation, he adds.

"The reality is: The dark element is much better at information-sharing than the corporations are."

In an interview about APT and cyber-extortion, Choudhary discusses:

  • Why these threats remain so hard to stop;
  • Top-line results of new research on cyber-extortion;
  • How organizations can fundamentally improve their APT defenses.

As Senior Vice President and Chief Product Officer for ThreatTrack, Usman Choudhary is responsible for defining and executing the company's product development strategy, and driving new cybersecurity innovations throughout its global research and development organization. He leads teams responsible for the creation of new advanced threat defense technologies and VIPRE endpoint security solutions.

Usman is an accomplished IT executive with nearly 20 years of leadership experience. Most recently, he was Senior Director of Engineering for NetIQ, where he was responsible for shaping the firm's security strategy and developing solutions for automating insider threat and breach detection for enterprises and Managed Security Service Providers.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.