Cloud Security , Governance & Risk Management , Next-Generation Technologies & Secure Development

The Need for Security Orchestration

Trend Micro's Craig Gibson on How Best to Leverage Top Security Resources
Craig Gibson, principal threat defense architect, Trend Micro

Craig Gibson of Trend Micro has spent more than a decade researching the topic of security orchestration. He offers tactical advice for how organizations can best deploy their human resources to best maximize security across the enterprise.

See Also: DataOps & Multi-Cloud: Streamlining Data Management

Gibson describes the the value of security orchestration in this video interview at Information Security Media Group's Toronto Fraud and Breach Prevention Summit.

In this interview, Gibson discusses:

  • The pitfalls of not orchestrating security;
  • Challenges posed by resource constraints;
  • His current research into emerging threats.

Gibson is principal threat defense architect at Trend Micro. With 18 years of project management, product development, architecture and investigations experience, he is currently dedicated to researching the evolution of the threat landscape - specifically trying to understand future impacts to the government, health, banking and telecom sectors. As a United Nations delegate to China, Gibson has previously spoken internationally on disruptive telecommunications, 9-1-1, public safety, payment cards, the security of voice services, call center authentication (cost reduction) and criminal code issues relating to fraud and unlawful interception of communications. Additionally, he has spoken on national infrastructure security topics to diplomats visiting Canada, as well as public safety, military officials and police executives.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.