Video

The Threat-Centric Security Approach

Oliver Friedrichs, SVP Cloud Technology, Sourcefire
The Threat-Centric Security Approach

Advanced threats require an advanced security strategy. Oliver Friedrichs of Sourcefire recommends a threat-centric security approach. In this interview, he explains exactly what that entails.

See Also: Wipro, AWS Team Up to Address Compliance in the Cloud Era

Despite the layers of security that organizations have deployed, they are still falling victim to infections and intrusions. The problem is the fundamental approach to security, Friedrichs says.

In this video interview, Friedrichs explains:

  • The definition of a threat-centric approach;
  • How it differs from the traditional methods;
  • Technology solutions that will enable the approach.

Friedrichs is Senior Vice President, Cloud Technology Group at Sourcefire, providing direction for the company's cloud-based technology strategy and executing Sourcefire's product development roadmap for the cloud platform. He brings more than 15 years of expertise in developing innovative security technologies and has worked closely with numerous government and commercial organizations to help address their cybersecurity requirements. Friedrichs joined Sourcefire in January 2011 as part of the Immunet acquisition where he was founder and CEO.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.